Welcome![Sign In][Sign Up]
Location:
Search - Java Cryptography java

Search list

[Other resourceCry-DES

Description: 用JAVA编写的用密码学中DES算法加密解密文件的程序-prepared with Java Cryptography with the DES encryption algorithm declassified document procedures
Platform: | Size: 39032 | Author: ying98 | Hits:

[Other resourceJavaCryptography

Description: Java Cryptography 应用 Java 实现加密,英文版。-Java Cryptography Application Java encryption and English.
Platform: | Size: 1393272 | Author: 东东 | Hits:

[CA authsecurity

Description: 说明: 1、里面有什么: 1.1、org.bouncycastle.*下的所有软件是bouncycastle组织开发的软件包 1.2、org.infosecurity.*下的软件包括: DES_CBC算法的实现 RSA算法的实现(包括:密钥生成、公钥加密和私钥解密、数字签名及签名验证) 数字信封的实现   利用数字信封实现大文件的加密、解密。 2、有什么用:   2.1 研究、学习信息安全中的密码学设计与实现技术。   2.2 当然如果大家觉得在其它地方用的上,我会觉得很高兴的。 3、还有什么改进: 3.1 对文件加密、解密的时候要频繁的IO,如果加一个缓冲区,比如10K、50K等, 只有缓冲区满了才写入DISK这样将提高效率。 3.2 RSA私钥积存的时候可以按PKCS8形式,再经BASE64编码保存比较好。-Note : 1, mean there : 1.1, org.bouncycastle .* of all software development organizations is bouncycastle package 1.2, org.infosecurity .* The software includes : DES_CBC algorithm to achieve the realization of the RSA algorithm (including : key generation, public key and private key encryption decryption, digital signatures and signature verification), the realization of digital envelope using digital envelope realize document encryption, decryption. Two, what is the use of : 2.1, learning the information security cryptography design and technology. 2.2 Of course, if you think in the other parts, I feel very happy. Three, what is there for improvement : 3.1 pairs of file encryption, decryption, and the time to frequent the IO, plus a buffer, such as 10K, 50K, the only buffer is needed for
Platform: | Size: 212992 | Author: 雷敏 | Hits:

[Crack HackRSA_crypt_system

Description: 这个源码是使用JAVA实现公钥密码算法RSA的一个简单示例程序。-this source is the use of JAVA RSA public key cryptography algorithm example of a simple procedure.
Platform: | Size: 10240 | Author: 张华 | Hits:

[Crack Hackcryptology

Description: 密码学中RSA,AES和数值签名的实现-Cryptography RSA, AES and numerical implementation of the Signature
Platform: | Size: 33792 | Author: tieqian | Hits:

[Grid ComputingSignData

Description: 1、实现集中式对称密钥的分配工作(作为通讯的双方A和B,都已经分别和KDC拥有会话密钥); 2、分布式对称密钥分配(作为通讯的双方A和B已经共享一个会话主密钥); 3、公钥密码技术实现对称密码技术密钥的分配(作为通讯的双方A和B已经拥有对方的公钥);-1, the realization of a centralized allocation of symmetric key (for communication between the parties A and B, respectively, and the KDC already has a session key) 2, Distributed symmetric key distribution (as communications between the parties A and B have to share a session master key) 3, public key cryptographic techniques to achieve symmetric cryptography key distribution (for communication between the parties A and B have each other' s public key)
Platform: | Size: 31744 | Author: liu | Hits:

[Crack Hackjiami

Description: 普通的加密算法,具有很强的使用性,可作为密码学专业参考-Common encryption algorithm used has a strong, and can be used as a professional reference Cryptography
Platform: | Size: 195584 | Author: song | Hits:

[Crack Hackcryptologycoding

Description: 一些重要的加密算法的实现---主要是针对大学密码学课程中的算法实践,例如: 维吉尼亚密码,置换密码,移位密码-Some key encryption algorithm--- mainly aimed at the realization of the University of cryptography algorithms for practical courses, such as: Virginia password, replacement password, password, and so shift
Platform: | Size: 1113088 | Author: zk | Hits:

[JSP/JavaPlayfair

Description: 最近在学密码学,这一个实现playfair加密算法的java类,主要包括构造函数、加密函数和解密函数,还有几个辅助函数,附有测试类,在控制台下运行的。-A recent study of cryptography, which playfair encryption algorithm to achieve a java class, mainly including constructor, encryption and decryption function, a function, and several auxiliary functions, with a test class, running under the console.
Platform: | Size: 6144 | Author: 老棉 | Hits:

[JSP/JavarsaCipher

Description: In cryptography, RSA (which stands for Rivest, Shamir and Adleman who first publicly described it see below) is an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be secure given sufficiently long keys and the use of up-to-date implementations.-In cryptography, RSA (which stands for Rivest, Shamir and Adleman who first publicly described it see below) is an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be secure given sufficiently long keys and the use of up-to-date implementations.
Platform: | Size: 1024 | Author: DS | Hits:

[JSPBeginning_Cryptography_with_Java

Description: While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.
Platform: | Size: 2560000 | Author: YY | Hits:

[JSPbeginning-cryptography-with-java

Description: beginning cryptography with java
Platform: | Size: 2554880 | Author: sam | Hits:

[Crack HackEllipticCurves_e

Description: Source code of elliptic curve cryptography
Platform: | Size: 3072 | Author: harish | Hits:

[JSPCryptography

Description: While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.
Platform: | Size: 2560000 | Author: bk | Hits:

[CA authRSA

Description: RSA-is an algorithm for public-key cryptography-RSA-is an algorithm for public-key cryptography
Platform: | Size: 6144 | Author: andrushkutzzaa | Hits:

[CA authEC

Description: ECC cryptography in java.
Platform: | Size: 14336 | Author: jack8888 | Hits:

[JSP/JavaWrox.Beginning.Cryptography.with.Java

Description: 关于在JAVA下实现加密的书,很专,很详细-Wrox.Beginning.Cryptography.with.Java
Platform: | Size: 2560000 | Author: lin | Hits:

[JSP/JavaJavaCryptography-OReilly

Description: Java Cryptography - O Reilly
Platform: | Size: 1393664 | Author: fati | Hits:

[JSPJava_cryptography

Description: JAVA Cryptography ebook
Platform: | Size: 1393664 | Author: tr | Hits:

[JSP/Java0764596330

Description: JAVA网络安全方面的书籍,非常有用,英文原版-David Hook- Beginning Cryptography with Java
Platform: | Size: 2560000 | Author: darren | Hits:
« 1 2 34 5 6 »

CodeBus www.codebus.net