Location:
Search - cryptographic
Search list
Description: source for cryptographic accelerator engine present in au1550 SOC platform
Platform: |
Size: 1814589 |
Author: wrtoch |
Hits:
Description: driver sources for CGX-Mobile cryptographic engine (present inside au1550 SOC)
Platform: |
Size: 1814589 |
Author: wrtoch |
Hits:
Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering.
Platform: |
Size: 1405952 |
Author: 周爽 |
Hits:
Description: 用Verilog实现国内第一个商用密码算法SMS4的加密和解密。-Using Verilog to achieve the first commercial cryptographic algorithm for encryption and decryption SMS4.
Platform: |
Size: 208896 |
Author: 闫伟伟 |
Hits:
Description: 这是个密钥匙生成代码,对大家帮助很大。还包括佳节密运算-This is a cryptographic key generation code, for all of us of great help. Festival also includes dense computing
Platform: |
Size: 1024 |
Author: 梁小武 |
Hits:
Description: Des算法是一种标准的对称加密算法,其精华就是明文经过一系列的复杂变化后,一般在不知密码的情况下要把它的恢复很难。
算法可以由四个部分描述:
1.获取16个子密钥
2.初始置换置换函数ip
3.加密函数f
4.末置换函数
-Des Algorithm is a standard symmetric encryption algorithm, and its essence is clear after a series of complex changes in law, the general in the circumstances I do not know the password should be difficult to restore it. Algorithm can be described in four parts: 1. To obtain 16 sub-keys 2. The initial replacement replacement function ip 3. Cryptographic function f 4. At the end of displacement function
Platform: |
Size: 180224 |
Author: wildkaede |
Hits:
Description: // 注意:
// (*) 如果未指定密钥,则程序集不会被签名。
// (*) KeyName 是指已经安装在计算机上的
// 加密服务提供程序(CSP)中的密钥。KeyFile 是指包含
// 密钥的文件。
// (*) 如果 KeyFile 和 KeyName 值都已指定,则
-//NOTE:// (*) If you do not specify the key, the assembly will not be signed.// (*) KeyName refers to has already been installed on the computer// Cryptographic Service Provider (CSP) in the key. KeyFile refers to contain// key documents.// (*) If the KeyFile and the KeyName values are specified, then
Platform: |
Size: 100352 |
Author: wang |
Hits:
Description: 本项目实现了高速对称密码算法AES,可以用它直接加密文件模块。-The project achieved a high-speed symmetric cryptographic algorithm AES, can use it to encrypt files directly modules.
Platform: |
Size: 1812480 |
Author: 熊齐文 |
Hits:
Description: MD5 (Message-Digest algorithm 5) is a widely used, partially insecure[1] cryptographic hash function with a 128-bit hash value. As an Internet standard (RFC 1321), MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. An MD5 hash is typically expressed as a 32 digit hexadecimal number.
Platform: |
Size: 3929088 |
Author: chu |
Hits:
Description: Cryptographic Key Generation from Voice
Platform: |
Size: 220160 |
Author: Praveen |
Hits:
Description: 微软CSP实现源码。
CSP:密码服务提供者。
微软的CryptoAPI是PKI推荐使用的加密 API。其功能是为应用程序开发者提供在Win32环境下使用加密、验证等安全服务时的标准加密接口。CryptoAPI处于应用程序和CSP(cryptographic service provider)之间 。
-Microsoft CSP achieve source. CSP: Cryptographic Service Provider. Microsoft' s CryptoAPI is recommended the use of PKI encryption API. Its function is to provide application development environment in Win32 the use of encryption, authentication and other security services interface standard encryption. CryptoAPI in applications, and CSP (cryptographic service provider) between.
Platform: |
Size: 541696 |
Author: eboy |
Hits:
Description: Realization of IDEA cryptographic algorithm
Platform: |
Size: 2048 |
Author: rafaella |
Hits:
Description: Cryptographic Module
Security Policy
for
jNet Citadel-OS on Atmel
AT90SC144144CT
Platform: |
Size: 418816 |
Author: johnny |
Hits:
Description: 主流密码算法的源代码里面都有,从某org网站上找到的-Mainstream cryptographic algorithms which have the source code from a Web site to find org
Platform: |
Size: 1049600 |
Author: lanyan |
Hits:
Description: 实现古典密码算法中置换密码的算法,实现加密和解密-To achieve the classical cryptographic algorithm displacement password algorithm encryption and decryption
Platform: |
Size: 1024 |
Author: li weixia |
Hits:
Description: 可以实现des加密算法 用c语言实现 包含源代码-des cryptographic algorithm C language code
Platform: |
Size: 14336 |
Author: qqq |
Hits:
Description: 基于labwindows/cvi的密码操作-Based on labwindows/cvi cryptographic operations
Platform: |
Size: 304128 |
Author: 左盼盼 |
Hits:
Description: Testing an S-Box for Cryptographic Use
Generally, one faces two type of problems related to the selection of
an s-box (substitution box/function) before its cryptographic use can be
considered secure. First one is how to design (or search) a good s-box
and second one is how to verify a given s-box is indeed a good one in
a sense of meeting its requirements. The requirements contain the types
and quantitative values of desired properties for an s-box.
Platform: |
Size: 246784 |
Author: venkatesan |
Hits:
Description: Cryptographic algorithm for key generation in c and c-Cryptographic algorithm for key generation in c and c++
Platform: |
Size: 2048 |
Author: mdchandra |
Hits:
Description: Cryptographic Hash Functions
Platform: |
Size: 1080320 |
Author: eyelight93 |
Hits:
« 12
3
4
5
6
7
8
9
10
...
32
»