Description: Visual Basic Blowfish functions
This a Visual Basic version of Bruce Schneier s Blowfish algorithm
as detailed in "Applied Cryptography", 2nd edition, 1996
It has been tested in VB6 and Access VBA. Use at your own risk.
Version 6. Published 20 November 2003. History at end.-Visual Basic Blowfish functions
This is a Visual Basic version of Bruce Schneier s Blowfish algorithm
as detailed in "Applied Cryptography", 2nd edition, 1996
It has been tested in VB6 and Access VBA. Use at your own risk.
Version 6. Published 20 November 2003. History at end. Platform: |
Size: 40960 |
Author:Daldegam |
Hits:
Description: des算法+代码
// des.cpp - modified by Wei Dai from:
/*
* This is a major rewrite of my old public domain DES code written
* circa 1987, which in turn borrowed heavily from Jim Gillogly s 1977
* public domain code. I pretty much kept my key scheduling code, but
* the actual encrypt/decrypt routines are taken from from Richard
* Outerbridge s DES code as printed in Schneier s "Applied Cryptography."
*
* This code is in the public domain. I would appreciate bug reports and
* enhancements.
*
* Phil Karn KA9Q, karn@unix.ka9q.ampr.org, August 1994.
*/-// des.cpp- modified by Wei Dai from:
/*
* This is a major rewrite of my old public domain DES code written
* circa 1987, which in turn borrowed heavily from Jim Gillogly s 1977
* public domain code. I pretty much kept my key scheduling code, but
* the actual encrypt/decrypt routines are taken from from Richard
* Outerbridge s DES code as printed in Schneier s "Applied Cryptography."
*
* This code is in the public domain. I would appreciate bug reports and
* enhancements.
*
* Phil Karn KA9Q, karn@unix.ka9q.ampr.org, August 1994.
*/ Platform: |
Size: 19456 |
Author:模糊 |
Hits:
Description: PHP实现RSA算法/*
* Implementation of the RSA algorithm
* (C) Copyright 2004 Edsko de Vries, Ireland
*
* Licensed under the GNU Public License (GPL)
*
* This implementation has been verified against [3]
* (tested Java/PHP interoperability).
*
* References:
* [1] "Applied Cryptography", Bruce Schneier, John Wiley & Sons, 1996
* [2] "Prime Number Hide-and-Seek", Brian Raiter, Muppetlabs (online)
* [3] "The Bouncy Castle Crypto Package", Legion of the Bouncy Castle,
* (open source cryptography library for Java, online)
* [4] "PKCS #1: RSA Encryption Standard", RSA Laboratories Technical Note,
* version 1.5, revised November 1, 1993
*/
-/*
* Implementation of the RSA algorithm
* (C) Copyright 2004 Edsko de Vries, Ireland
*
* Licensed under the GNU Public License (GPL)
*
* This implementation has been verified against [3]
* (tested Java/PHP interoperability).
*
* References:
* [1] "Applied Cryptography", Bruce Schneier, John Wiley & Sons, 1996
* [2] "Prime Number Hide-and-Seek", Brian Raiter, Muppetlabs (online)
* [3] "The Bouncy Castle Crypto Package", Legion of the Bouncy Castle,
* (open source cryptography library for Java, online)
* [4] "PKCS#1: RSA Encryption Standard", RSA Laboratories Technical Note,
* version 1.5, revised November 1, 1993
*/
Platform: |
Size: 6144 |
Author:gg |
Hits:
Description: Applied Cryptography, Second Edition Protocols, Algorthms, and Source Code in C - Bruce Schneier Platform: |
Size: 3794944 |
Author:Leganola Aston |
Hits: