Welcome![Sign In][Sign Up]
Location:
Search - Java Cryptography java

Search list

[Crack Hackbcprov-jdk15-138.tar

Description: java非对称加密的源代码-asymmetric cryptography java source code
Platform: | Size: 3437568 | Author: sam | Hits:

[Crack Hackjava_encrypt_decrypt

Description: 1、利用公钥密码技术实现对称密码技术密钥的分配; 2、利用所分配的对称密钥对通信内容进行加/解密; -1, the use of public key cryptographic techniques to achieve symmetric cryptography key distribution 2, using the symmetric key by the distribution of the content of communication encryption/decryption
Platform: | Size: 17408 | Author: 张海滨 | Hits:

[Crack HackMD5

Description: 密码学中MD5算法的JAVA实现 密码学中MD5算法的JAVA实现-Cryptography MD5 algorithm realize JAVA Cryptography MD5 algorithm realize JAVA
Platform: | Size: 6144 | Author: JINW | Hits:

[Crack HackPL

Description: playfair 加密算法的java实现,使用密码学的学生学习参考-Playfair encryption algorithm to achieve the java, the use of cryptography reference to student learning
Platform: | Size: 1024 | Author: liufan | Hits:

[JSP/JavaDSA

Description: java写的DSA数字签名算法,是密码学中的典型算法-java wrote DSA Digital Signature Algorithm is Cryptography typical algorithm
Platform: | Size: 8192 | Author: 赵欢 | Hits:

[Crack Hackrsa

Description: ecplise环境下密码学RSA算法的实现-ecplise environment RSA cryptography algorithm implementation
Platform: | Size: 3072 | Author: 严海 | Hits:

[Crack HackECC

Description: eliptic curve cryptography decryption
Platform: | Size: 37888 | Author: senthamaraikannan | Hits:

[J2MEJ2me-AES

Description: [cryptography] AES encrypt and decrypt for j2me,
Platform: | Size: 3072 | Author: SofTech | Hits:

[Crack Hackcryptography

Description: 使用DES解密和加密文件,供JAVA爱好者交流和学习-The use of DES decryption and encryption documents for sharing and learning JAVA lovers
Platform: | Size: 1024 | Author: mu | Hits:

[JSPjava

Description: Java book with respect to cryptography
Platform: | Size: 27357184 | Author: pradheep | Hits:

[Crack HackPrimeGenAndTester

Description: Very large (tested for more than 2048 bits) prime number generator and tester program. This is well written and based on solid algorithms in this field. Source code is my own, used for Masters course in Cryptography. Program has easily readable and well written algorithm implementation to check for Jacobian Symbol, choice of two methods for primality testing: Miller-Rabin or Solovay-Strassen method and Blum-Blum Shub method for random number generation. Input and output of the program is through files in \bin directory. Project is compatible with Java Eclipse 3.0 IDE, but can also be easily built from command line.-Very large (tested for more than 2048 bits) prime number generator and tester program. This is well written and based on solid algorithms in this field. Source code is my own, used for Masters course in Cryptography. Program has easily readable and well written algorithm implementation to check for Jacobian Symbol, choice of two methods for primality testing: Miller-Rabin or Solovay-Strassen method and Blum-Blum Shub method for random number generation. Input and output of the program is through files in \bin directory. Project is compatible with Java Eclipse 3.0 IDE, but can also be easily built from command line.
Platform: | Size: 22528 | Author: s_wilfred | Hits:

[Crack Hack22

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pig.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2;-Completion of asymmetric cryptography based on symmetric key distribution work Description: (1) the completion of the asymmetric public key certificate-based key distribution based on the work, according to the materials on asymmetric cryptography based on symmetric key distribution scheme, the completion of the allocation of symmetric key Ks. (2) A document with Ks on an image (test_pig.bmp) is encrypted and sent to B, B to decrypt receipt, compared to the original image to see if the same, and record the entire encryption/decryption time spent T2 (3) contrast T1 and T2
Platform: | Size: 43008 | Author: 熊龙生 | Hits:

[JSP/JavaCryptography

Description: It contains the examples from Java Cryptography book
Platform: | Size: 62464 | Author: m | Hits:

[Mathimatics-Numerical algorithmsAssymmetric-Cryptography-project

Description: This is the Assysmmetric Cryptography algorithm created using Java. This is to identfy Finger prints.One of the popular algorithm
Platform: | Size: 115712 | Author: Archana Palani | Hits:

[JSP/Javadigitalstegnography

Description: Digital image stegnography it is very latest approach to Cryptography
Platform: | Size: 132096 | Author: Epsan | Hits:

[Industry researchM-Java

Description: Java cryptography resource is a nice resource for programming for encryption and decryption.
Platform: | Size: 399360 | Author: Amol/justamol | Hits:

[CA authJava-Stego

Description: stenography & cryptography using java
Platform: | Size: 2058240 | Author: bakri | Hits:

[JSP[EBOOK---EN]-OReilly---Java-Cryptography

Description: [EBOOK - EN] O Reilly - Java Cryptography
Platform: | Size: 1393664 | Author: Andrew Qz | Hits:

[JSPJava-Cryptography.pdf

Description: java的入门神器,非常经典. 介绍Java 相关知识的影印版书籍,深入浅出,适合初学者-java entry artifact, very classic. introduce a photocopy version of Java knowledge of books, a simple and suitable for beginners
Platform: | Size: 1398784 | Author: 于泳浩 | Hits:

[OS programBeginning-Cryptography-with-Java-0764596330

Description: A book about encrytion in Java
Platform: | Size: 2561024 | Author: bushra | Hits:
« 1 23 4 5 6 »

CodeBus www.codebus.net