CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Crack Hack
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Crack Hack list
Sort by :
«
1
2
...
.58
.59
.60
.61
.62
763
.64
.65
.66
.67
.68
...
1665
»
ARCHITECTURE
Downloaded:0
4G design and architecture
Update
: 2025-02-03
Size
: 1.62mb
Publisher
:
syed yasir ali
elgamal-signature
Downloaded:0
Miracl library implementation based on large numbers of elgamal signature algorithm c-language implementation
Update
: 2025-02-03
Size
: 492kb
Publisher
:
hbhb
elgamal-Verify-Signature
Downloaded:0
Based on large numbers of elgamal library miracl verify signatures c language implementation
Update
: 2025-02-03
Size
: 1.01mb
Publisher
:
hbhb
RSA
Downloaded:0
Based on large numbers of RSA encryption and decryption library miracl algorithm, which gen.c is to generate the key, encode.c is encrypted, decode.c is to decrypt
Update
: 2025-02-03
Size
: 1.31mb
Publisher
:
hbhb
DES
Downloaded:0
After the study of cryptography, based on DES algorithm is written in c language.
Update
: 2025-02-03
Size
: 221kb
Publisher
:
hbhb
EC-Signature
Downloaded:0
Database based on large numbers miracl elliptic curve signature algorithm EC for c-language implementation
Update
: 2025-02-03
Size
: 374kb
Publisher
:
hbhb
EC-Verify-Signature
Downloaded:0
Based on large numbers miracl library EC verification of an elliptic curve signature algorithm c-language implementation
Update
: 2025-02-03
Size
: 361kb
Publisher
:
hbhb
20040515
Downloaded:0
Key escrow problem of IBC conducted in-depth research in recent years through the analysis of key management scheme proposed a new strong key management program.
Update
: 2025-02-03
Size
: 391kb
Publisher
:
张伟
20040615
Downloaded:0
For the IBC-based wireless Ad hoc network security threats exist in key management, this paper analysis of all nodes can be mobile wireless network group communication based on the security needs of the hierarchical dist
Update
: 2025-02-03
Size
: 303kb
Publisher
:
张伟
20060424
Downloaded:0
PKI, compared with the traditional, IBC such as key generation, distribution, and management has a clear advantage. The use of identity-based password system, can effectively reduce the computation and storage.
Update
: 2025-02-03
Size
: 156kb
Publisher
:
张伟
20060428
Downloaded:0
Proposed a new strong key management program. The program draws on secret key generation center (KGC) and the secret key factors and Fabrication Center (KGCC) co-hosted with the secret key to the completion of secret key
Update
: 2025-02-03
Size
: 190kb
Publisher
:
张伟
tfm
Downloaded:0
Another algorithm is TomsFastMath Implementation
Update
: 2025-02-03
Size
: 8kb
Publisher
:
xiao_shaoyong
«
1
2
...
.58
.59
.60
.61
.62
763
.64
.65
.66
.67
.68
...
1665
»
CodeBus
is the largest source code store in internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.