Welcome![Sign In][Sign Up]
Location:
Search - Shamir

Search list

[Internet-Networkaircrack-2.1

Description: aircrack is a 802.11 WEP key cracker. It implements the so-called Fluhrer - Mantin - Shamir (FMS) attack, along with some new attacks by a talented hacker named KoreK. When enough encrypted packets have been gathered, aircrack can almost instantly recover the WEP key.-aircrack is a 802.11 WEP key cracker. It implements the so-called Fluhrer- Mantin- Shamir (FMS) attack, along with some new attacks by a talented hacker named KoreK. When enough encrypted packets have been gathered, aircrack can almost instantly recover the WEP key.
Platform: | Size: 126976 | Author: 張中原 | Hits:

[Industry researchshamir ID

Description: 介绍了一种特殊的公钥密码体制——基于身份的公钥密码体制。本文相当经典,是目前商用密码体制的经典思想。-introduced a special public-key cryptosystem-- identity-based public-key cryptosystem. This very classic, which is the business Cryptosystem classic thinking.
Platform: | Size: 279552 | Author: 张进 | Hits:

[OS programLibrary_of_Cryptographic

Description: a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.-a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.
Platform: | Size: 388096 | Author: 刘永 | Hits:

[Otherhowtosharesecret

Description: shamir的秘密分享机制的原文。秘密分享门限机制中,利用拉格朗日插值多项式来恢复。-shamir secret-sharing mechanism in the original language. Threshold secret sharing mechanism, the use of Lagrange polynomial interpolation to restore.
Platform: | Size: 184320 | Author: 黄海凌 | Hits:

[Crack Hacksecretshare_VC++

Description: Shamir秘密分享与恢复算法的VC++程序,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再得出主密钥。输入大数长度和份数可自行定义(默认是270位和不超过20份)。-Shamir secret sharing and recovery algorithm VC procedures, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion to restore the original polynomial, then come to the main key. Length and the importation of large numbers of shares to be defined (the default is 270 and not more than 20).
Platform: | Size: 1963008 | Author: linvg | Hits:

[Crack Hacksecretshare_java

Description: Shamir秘密分享算法的java实现,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再求出主密钥。-Shamir secret sharing algorithm to achieve the java, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion to restore the original polynomial, then calculated the main key.
Platform: | Size: 5120 | Author: linvg | Hits:

[JSP/JavaShamirAlgorithms

Description: 用java实现Shamir门限算法,可用于数据的加密解密,特别是传送加密密钥时有用-with java achieve Shamir threshold algorithm can be used for data encryption and decryption. Special transmission of the encryption key is useful when
Platform: | Size: 2048 | Author: XUN | Hits:

[Crack HackRSA

Description: RSA公开密钥密码系统是由R.Rivest,A.Shamir,L.Adleman提出的,不仅仅可用于数据的加密,也可用于数字签名。本程序提供了RSA加密和解密过程实现的源代码。-RSA public key cryptosystem by R. Rivest, A. Shamir, L. Adleman raised, not only can be used for data encryption, digital signatures can also be used. This procedure provides the RSA encryption and decryption process of the realization of the source code.
Platform: | Size: 663552 | Author: 严玉洁 | Hits:

[Windows DevelopShamirSecretSharingScheme

Description: C++ implementation for Shamir Sharing Key protocol.
Platform: | Size: 2048 | Author: Calin Juravle | Hits:

[Crack HackBasicRSA_latest.tar

Description: RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key and private key. Public key (e) . You may choose any number for e with these requirements, 1< e <Æ (n), where Æ (n)= (p-1) (q-1) ( p and q are first-rate), gcd (e,Æ (n))=1 (gcd= greatest common divisor). Private key (d). d=(1/e) mod(Æ (n)) Encyption (C) . C=Mª mod(n), a = e (public key), n=pq Descryption (D) . D=C° mod(n), o = d (private key- RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key and private key. Public key (e) . You may choose any number for e with these requirements, 1< e <Æ (n), where Æ (n)= (p-1) (q-1) ( p and q are first-rate), gcd (e,Æ (n))=1 (gcd= greatest common divisor). Private key (d). d=(1/e) mod(Æ (n)) Encyption (C) . C=Mª mod(n), a = e (public key), n=pq Descryption (D) . D=C° mod(n), o = d (private key
Platform: | Size: 5120 | Author: nb | Hits:

[Crack Hackshamir

Description: shamir加密算法,传上来供大家参考,欢迎大家批评指正-encryption algorithm shamir, Chuan-up for your information, welcome criticism
Platform: | Size: 1024 | Author: lin | Hits:

[Windows Developsrc

Description: shamir‘s secret sharing C语言源码,对密码分割合并实现秘密共享-shamir' s secret sharing C language source code for the password secret sharing to achieve the combined partition
Platform: | Size: 245760 | Author: iuhiuh | Hits:

[matlabcriptografia_visual

Description: this a matlab code of the method of visual cryptography based in the shadows method of Visual Cryptography, Moni Naor, Adi Shamir. -this is a matlab code of the method of visual cryptography based in the shadows method of Visual Cryptography, Moni Naor, Adi Shamir.
Platform: | Size: 3072 | Author: galicianpeople | Hits:

[Otherp612-shamir

Description: How to Share a Secret explained by shamir
Platform: | Size: 184320 | Author: sweetu | Hits:

[Crack HackShamir

Description: Shamir Scheme. Implmentació a cryptographic protocol based on the threshold scheme.
Platform: | Size: 41984 | Author: knals | Hits:

[Crack HackShamir

Description: Shamir秘密分享算法的C#实现,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再求出主密钥。-Shamir secret sharing algorithm to achieve the java, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion to restore the original polynomial, then calculated the main key.
Platform: | Size: 2179072 | Author: | Hits:

[Crack HackShamir's Secret Sharing-JavaScript

Description: Shamir's Secret Sharing 秘密分享使用JavaScript实现(Shamir's Secret Sharing Secret Sharing USES JavaScript implementation)
Platform: | Size: 2048 | Author: hkkhuang | Hits:

[Crack HackShamir Secret Share

Description: 针对Shamir 门限密码共享方案的实现(Implementation of Shamir vsharing scheme)
Platform: | Size: 907264 | Author: 密码爱好者 | Hits:

[Crack HackShamir Secret Sharing

Description: shamir secret sharing加解密实现(shamir secret sharing encryption)
Platform: | Size: 27648 | Author: masitian | Hits:

[Crack Hack基于Shamir秘密共享的云端多副本审计

Description: 基于Shamir秘密共享的云端多副本数据持有性审计-20150605 基于Shamir秘密共享的云端多副本数据持有性审计-20150605(Cloud multi replica data holding audit -20150605 based on Shamir secret sharing)
Platform: | Size: 668672 | Author: 123wdw | Hits:
« 12 3 4 »

CodeBus www.codebus.net