Welcome![Sign In][Sign Up]
Location:
SourceCode OS program CA auth

CA auth List Page 5

« 1 2 3 4 56 7 8 9 10 ... 232 »

[CA authAvick_389

Description: Japanese Game picture
Platform: | Size: 284672 | Author: izul | Hits:

[CA authAES128_ENCRYPT

Description: aes128 encryption program, it can output the detailed information in each epoch.
Platform: | Size: 4096 | Author: 李大好 | Hits:

[CA authLyapunov-exponent-curve-of-logistic

Description: The logistic map contains the code, and draw the image bifurcation diagram of logistic map and Lyapunov exponent, image and program results. The Lyapunov exponent in the study of power system bifurcation and chaotic moti
Platform: | Size: 25600 | Author: 董大牛 | Hits:

[CA authsts-2.1.2

Description: NIST random number detection tool source code, according to the state secret inspection products pre detection random number test
Platform: | Size: 43915264 | Author: liuwenbo | Hits:

[CA authBB84-Client-master

Description: One of the Quantum cryptology protocol, BB84 protocol implementation in Java.
Platform: | Size: 66560 | Author: Raex | Hits:

[CA authrsacsp

Description: * dlls/rsaenh/rsaenh.c 0003 * RSAENH- RSA encryption for Wine
Platform: | Size: 43008 | Author: zheng | Hits:

[CA authmschapv2acc-master

Description: The chap protocol clears
Platform: | Size: 22528 | Author: 小明 | Hits:

[CA authLabViewv3.1

Description: This is a password cracking software, but time is longer, rape cracking method
Platform: | Size: 205824 | Author: ye | Hits:

[CA authBLAKE2-master

Description: BLAKE2 are cryptographic hash functions based on Dan Bernstein s Cha stream cipher, but a permuted copy of the input block, XORed with some round constants, is added before each Cha round. Like SHA-2, there are two varia
Platform: | Size: 497664 | Author: Jonathan Young | Hits:

[CA authPhelix-Optimized

Description: Phelix 1 is a high-speed stream cipher with a built-in MAC func- tionality. It is efficient in both hardware and software. On current Pentium CPUs, Phelix has a per-packet overhead of less than 900 clocks, plus a per- by
Platform: | Size: 584704 | Author: Jonathan Young | Hits:

[CA authSM3HASH

Description: the hash algorithm of SM3,the basic standard of Chinese cryptographic algorithm SM3
Platform: | Size: 67584 | Author: 张立四 | Hits:

[CA authDecryption-algorithmCPPcode

Description: Common decryption algorithms, including detailed examples and algorithmic annotations
Platform: | Size: 334848 | Author: 张晓晓 | Hits:
« 1 2 3 4 56 7 8 9 10 ... 232 »

CodeBus www.codebus.net