Description: 1. Analysis of ECB mode and CBC mode of encryption process. 2. Used programming language programming to realize the algorithm process. 3. Enter explicitly: I do like this book encryption algorithm E: XOR ⊕, key for cryption shift, key for 5 filled two modes: (1) 0 (2) misappropriated Ciphertext initialization vector IV : goodluck with two modes for encryption, the output corresponding ciphertext.
- [ECC(ellipticcurveencryptionalgorithm)source] - ECC (elliptic curve encryption algorithm
- [VC_RSA] - one, the basic tenets of RSA expressly g
- [haodeECC] - ECC encryption source code, I have been
- [paixu] - Sort simple choice, this is a solution t
- [jkcx] - A monitoring program, a data transceiver
- [DES] - DES encryption type, you can customize t
- [DESdemo] - I have written DES encryption/decryption
- [suxingjiance] - Primality testing, using three methods:
- [LFSR] - 1. Analysis of n-bit LFSR to generate m
- [jiami] - Application of encryption algorithms and
File list (Check if you may need any files):