Welcome![Sign In][Sign Up]
Location:
Search - RANDOM KEY

Search list

[VC/MFCSecure_Programming_Cookbook_for_C_and_C++

Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering.
Platform: | Size: 1405952 | Author: 周爽 | Hits:

[Picture Viewerrandmtx

Description: 这是一个在利用密钥产生随机序列,他能实现在伪随机序列的产生-This is a key generated using random sequence, he can achieve the pseudo-random sequence generation
Platform: | Size: 2048 | Author: 杨永 | Hits:

[Windows DevelopWSN_Simulation_Application

Description: Wireless Sensor Network密钥管理方案仿真程序,可仿真Laurent Eschenauer和Virgil D. Gligor提出的基于随机图理论的管理方案以及其他多种自定义密钥管理方案。-Wireless Sensor Network Key Management Scheme simulation program can be simulation Laurent Eschenauer and Virgil D. Gligor proposed a random graph theory-based management programs, as well as a variety of other custom key management program.
Platform: | Size: 241664 | Author: 旺老财 | Hits:

[Mathimatics-Numerical algorithmsrand

Description: 均匀分布伪随机数发生器 伪随机数在计算机软件设计中有很广泛的用途。本文介绍了基于数学方法的利用计算机产生伪随机数的一种方法,即线性同余法,任何伪随机数的产生都是运用递推的原理来生成的。以及在Visual C++环境中产生伪随机数的两个重要函数,rand和srand函数,正确地使用这两个函数是产生性能良好的伪随机数的关键 -Uniformly distributed pseudo-random number generator, pseudo-random number in the computer software design in a very wide range of functions. This paper introduces the mathematical methods based on the use of computer generated pseudo-random number in a way that the linear congruence method, any pseudo-random number generated is to use the principle of recursive generated. As well as in Visual C++ Environment pseudo-random number generated two important functions, rand and srand functions, proper use of these two functions is the good performance of the pseudo-random number key
Platform: | Size: 211968 | Author: 徐雷 | Hits:

[Crack HackClient

Description: 基于挑战—应答模式的客户端认证程序,客户服务器相互发送随机数生成会话密钥,使用md5和des算法。-Based on the challenge- response mode of client authentication process, client-server send each other random number generator session key, the use of md5 and des algorithm.
Platform: | Size: 1291264 | Author: green | Hits:

[Compress-Decompress algrithmsrandnumber

Description: 伪随机数的产生程序 有m序列还有同余序列等等 用与嵌入信息位置的选择或密钥的制作-Pseudo-random number generation process has m sequences are congruent with and embedded in sequence and so the choice of location information or the production of key
Platform: | Size: 5120 | Author: 长风 | Hits:

[VC/MFCElGamal

Description:  ElGamal算法既能用于数据加密也能用于数字签名,其安全性依赖于计算有限域上离散对数这一难题。 密钥对产生办法。首先选择一个素数p,两个随机数, g 和x,g, x < p, 计算 y = g^x ( mod p ),则其公钥为 y, g 和p。私钥是x。g和p可由一组用户共享。 ElGamal用于数字签名。被签信息为M,首先选择一个-ElGamal algorithm not only used for data encryption can be used for digital signatures, their safety depends on the calculation of a finite field discrete logarithm this problem. Key to the method. First of all, choose a prime number p, the two random numbers, g and x, g, x <p, computing y = g ^ x (mod p), for its public key y, g and p. Private key is x. g and p by a group of users to share. ElGamal for digital signatures. Information was signed M, first choose a
Platform: | Size: 1024 | Author: 修凤志 | Hits:

[Windows Developkey

Description: 一个简单的,能够随机密码的生成工具,及其源代码。-A simple, able to generate a random password tool, and its source code.
Platform: | Size: 1872896 | Author: zgeagle | Hits:

[Crack Hackdirsh

Description: 文件夹加密工具(开源代码) 软件作者:dyforc 发现文件夹加密的软件较少,而且都不大适合我用,所以写了一个。主要是对指定文件夹和其子目录下所有文件加密。 用到的加密算发是RC4。 本程序特色: 1. 可以指定加密长度(即只对文件的一部分进行加密),(对大文件加密很有用) 2. 可以随机生成动态密钥 (即使加密目录下某个文件的加密密钥被破解了,不影响目录下其他加密过的文件,因为每个文件加密密钥不同,都由输入的密钥随机计算产生) 3. 可以随机化文件名,对文件生成MD5,以此来保障解密成功。 4. 加解密过程中程序允许执行指定脚本。-Folder encryption tool (open source code) Software Author: dyforc Found the software folder encryption less, but I do not fit, so to write one. Is the designated folder and all its subdirectories file encryption. Calculation made use of encryption is RC4. This procedure features: 1. Can specify the encryption length (that is, only part of the document encryption), (large file encryption useful) 2. Can be randomly generated dynamic key (Even if encrypted a file directory of the encryption key being cracked, the directory does not affect other encrypted files, because a different encryption key for each document, by the calculation of input generate a random key) 3. Of file name can be random, the document to generate MD5, in order to protect the successful decryption. 4. The process of encryption and decryption process to allow the implementation of the specified script.
Platform: | Size: 74752 | Author: 噶噶 | Hits:

[Crack Hackkhalil2006_true_random_number_generator

Description: a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES.
Platform: | Size: 418816 | Author: Hassan Abdelaziz | Hits:

[Booksstablemovementscenario

Description: 用NS- 2 仿真各种路由协议性能时用到的传统运动场景发生器存在两个缺陷: 运动状态不能迅速过渡到稳态, 节点速度的 均匀分布区间起始值只能为0。为了弥补上述缺陷, Tracy Camp 研制了稳态运动场景发生器。通过仿真验证了采用该发生器可大 大缩短仿真时间, 在此基础上仿真AODV 和DSDV 两种路由协议, 首次从吞吐量、协议包开销、平均延迟三个方面对稳态运动场景 下的两种路由协议性能进行分析, 得出结论表明采用稳态运动场景进行路由协议仿真是非常必要的。 关键词: 稳态运动场景 setdest 更新过程 Random Waypoint-Abstr act: As a module of NS2, the traditional movement scenario generator, when simulating routing protocol, has two limitations. One is that the transition time of stable status is long, and the other is that the uniform- distributing low bound of node speed is only zero.To remedy these faults, Tracy Camp has developed a stable movement scenario generator.The simulation proves that simulation time can be reduced largely by using this generator.Based on this result, a simulation for AODV and DSDV routing protocol is implemented.Then the performance of two protocols is analyzed on three aspects: throughput, routing overhead packets, average delay.At last the conclusion is drawn, which shows it is essential to adopt stable movement for simulation of routing protocols. Key words: stable movement scenario setdest renewal process Random Waypoint
Platform: | Size: 172032 | Author: 王立 | Hits:

[Crack HackRSA_java

Description: 带界面的RSA算法,软件包中含有可执行程序,功能有自动生成随机素数P、Q,公钥,密钥,对数字进行加密解密。-Interface with the RSA algorithm, packages containing executable programs, automatic generation of random functions of prime numbers P, Q, a public key, keys for encryption and decryption of digital.
Platform: | Size: 23552 | Author: xuxu | Hits:

[JSP/JavaMainClass

Description: 一个ElGamal的例子,key是随机生成-El Gamal example with random key generation
Platform: | Size: 1024 | Author: 蒋理 | Hits:

[OtherAHP(RI)

Description: 层次分析法(AHP)是进行评估的一种常用方法,其中层次分析法中求随机一致性指标是该方法的关键一步。本程序即实现的求解PI的程序-AHP is a common method of assessment, in which AHP seek random consistency index is a key step in the method. This procedure that is implemented procedures for solving PI
Platform: | Size: 1024 | Author: 李森 | Hits:

[OS programEncryption_Demo

Description: C#加密解密程序及源代码,加密主要分两步进行,第一步选择文件,第二步随机产生对成加密钥匙Key和IV、使用发送者私钥签名随机密钥,使用接收者公钥加密密钥和签名、利用随机密钥使用DES算法分组加密数据、MD5摘要生成-->用发送者私钥签名;-C# encryption and decryption procedures and source code, encryption key two steps, first select the file, step right into a randomly generated encryption key Key, and IV, using the sender' s private key signing random key, use the recipient public key encryption secret keys and signatures, using random key encrypted data packet using the DES algorithm, MD5 summary is generated- " with the sender' s private key signature
Platform: | Size: 20480 | Author: jiangfengmou | Hits:

[Crack HackEncryptDectyptTool_Src

Description: 写了一个文件加解密工具(VC9+OPENSSL) CA程序: 生成2个RSA密钥对,分别保存为PEM格式,密码保护私钥,文件名为“RSAPrivateKey.pem”和“RSAPublicKey.pem”。 加密: 将指定明文文件加密,密文件格式自已定义,要求文件内容用对称算法(3des)加密,对称密钥(KEY)为随机生成,随机密钥用“RSAPrivateKey.pem”的公钥加密后,存放在密文文件头内(KEY1);对明文文件做摘要计算(HASH),将计算结果用“RSAPublicKey.pem”的私钥加密后(SIGN),放到密文文件头内;文件头内有明文的原始长度信息。 解密: 将密文文件解密成明文文件,流程与加密相反,先用“RSAPrivateKey.pem”私钥解密(KEY1)数据,得出随机密钥(KEY);用随机密钥对密文解密,得到明文文件;对明文文件进行摘要计算,得出HASH1;用“RSAPublicKey.pem”公钥解密SIGN,得出HASH2;HASH1与HASH2做对比,相同表示解密成功,不同表示解密失败。 密文文件头内可以保存原始加密人的信息以及解密人的信息,这样可以快速判断解密者是否有权限解密该密文文件,如果有权限则进行解密过程,否则直接提示没有权限解密。 -To write a file encryption and decryption tool (VC9+ OPENSSL) CA procedures: Generates two RSA key pairs, respectively, save for the PEM format, password-protected private key, the file named "RSAPrivateKey.pem" and "RSAPublicKey.pem". Encryption: The specified plaintext file encryption, secret self-definition file formats require the document to use symmetric algorithms (3des) encryption, symmetric key (KEY) is randomly generated, random key to use "RSAPrivateKey.pem" public key encryption, stored in the ciphertext header inside (KEY1) summary of the calculation of the plaintext file to do (HASH), the calculation results with the "RSAPublicKey.pem" private key encryption (SIGN), into ciphertext in the file header file header if there is express The original length of the message. Decryption: Decrypt the ciphertext into a plaintext file documents, processes and encrypt the contrary, the first to use "RSAPrivateKey.pem" decrypt the private key (KEY1) data, derived random k
Platform: | Size: 1097728 | Author: 张希行 | Hits:

[Othersimpleepo

Description: This the simple infector/shellcode generator. Infects EXE-files by encrypted with random key shellcode, which is available to execute specified command. It could be used in trojans or bots as an alternative for autorun. Does not change the file size.-This is the simple infector/shellcode generator. Infects EXE-files by encrypted with random key shellcode, which is available to execute specified command. It could be used in trojans or bots as an alternative for autorun. Does not change the file size.
Platform: | Size: 6144 | Author: sogetthis | Hits:

[OS programha_processexplorer1204_fdl

Description: Process Explorer 是一款免费的增强型任务管理器,是最好的进程管理器. 它能让使用者了解看不到的在后台执行的处理程序,可以使用它方便地管理你的程序进程. 能监视,挂起,重启,强行终止任何程序,包括系统级别的不允许随便终止的关键进程和十分隐蔽的顽固木马. 除此之外,它还详尽地显示计算机信息: CPU,内存,I/O使用情况,可以显示一个程序调用了哪些动态链接库DLL,句柄,模块,系统进程. 以目录树的方式查看进程之间的归属关系,可以对进程进行调试. 可以查看进程的路径,以及公司,版本等详细信息,多色彩显示服务进程,很酷的曲线图. 可以替换系统自带的任务管理器,有了它,系统自带的任务管理器就可以扔进垃圾桶了.-Process Explorer is a free enhanced task manager, is the best process manager. It allows users to understand the invisible processes performed in the background, you can use it to easily manage your application process. Can monitor, suspend, restart, forced termination of any program, including system-level process does not allow random key and termination are very stubborn Trojan hidden. In addition, it displays detailed computer information: CPU, memory, I/O use, can show a program which is called dynamic link library DLL, handle, module, system processes. to see the process tree way relationship between the attribution, you can debug the process. you can see the path of the process, and the company , version, etc. For more information, multi-color display service process, cool the curve. can replace the system comes with the Task Manager, with it, the system comes with the Task Manager can be thrown into the trash the.
Platform: | Size: 1312768 | Author: 徐子豪 | Hits:

[JSP/JavaFont-random-variation

Description: 字体随机变化,采用图形用户界面。关键代码是random,这是随机的关键词。-Random font changes, the use of graphical user interface. The key code is random, it is random keywords.
Platform: | Size: 1024 | Author: luo | Hits:

[OS programSessionKey

Description: Generates Session Key, Random Key etc
Platform: | Size: 2048 | Author: Logu | Hits:
« 12 3 4 5 6 7 8 9 10 »

CodeBus www.codebus.net