CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - cryptosystem
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - cryptosystem - List
[
Other
]
1. A block cipher cryptosystem using wavelet tran
DL : 0
在现在信息的安全性得到了重视,水印技术在信息隐藏中是一种新的方法。这篇文章能够帮助我们理解水印技术。-now information security has been the focus of attention, watermark technology in the Information Hiding is a new approach. This article can help us to understand watermarking technology.
Update
: 2008-10-13
Size
: 522.78kb
Publisher
:
王清华
[
Crack Hack
]
pgp262
DL : 0
PGP 是一种混合密码系统。当用户使用PGP 来对纯文字加密的时候, PGP 首先会压缩这 段纯文字。数据压缩能够节省调制解调器传输时间以及磁盘类空间,还有更重要的、强化密码法的 保密程度。-PGP is a hybrid cryptosystem. When the user to use PGP to encrypt the text, PGP will first this text compression. Data compression can save time and modem transmission disk space, and more importantly, to strengthen the password confidentiality law.
Update
: 2008-10-13
Size
: 276.46kb
Publisher
:
刘二
[
Crack Hack
]
HillCodor
DL : 0
在VC环境下采用希尔密码体制加密、解密和破译。该软件实现了输入任意长度的密钥对文件进行加密和解密,解密密钥和密文保存在文件中。如果有完整的明文和对应的密文可是实现破译功能,即得出加密密钥。-in VC environment with Hill cryptosystem encryption, decryption and decoding. The software arbitrary length of the input to the key document encryption and decryption, and the decryption key secret to preserve the text in the document. If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.
Update
: 2008-10-13
Size
: 41.82kb
Publisher
:
枫
[
Other resource
]
shamir ID
DL : 0
介绍了一种特殊的公钥密码体制——基于身份的公钥密码体制。本文相当经典,是目前商用密码体制的经典思想。-introduced a special public-key cryptosystem -- identity-based public-key cryptosystem. This very classic, which is the business Cryptosystem classic thinking.
Update
: 2008-10-13
Size
: 273.03kb
Publisher
:
张进
[
Web Server
]
powerrmv
DL : 0
RSA公开密钥密码系统是由R.Rivest,A.Shamir,L.Adleman提出的,不仅仅可用于数据的加密,也可用于数字签名,-RSA public-key cryptosystem by R. Rivest, A. Shamir, L. Adleman raised, not only can be used for data encryption, can also be used for digital signatures,
Update
: 2008-10-13
Size
: 107.96kb
Publisher
:
刘浪
[
Search Engine
]
NTRU-1
DL : 1
NTRU公钥密码体制的环积实现代码,这个只是一个最基础的实现,-NTRU public key cryptosystem Central plot achieve code, the only one to achieve the most basic,
Update
: 2008-10-13
Size
: 7.93kb
Publisher
:
丝亚
[
Crack Hack
]
hybridDESRSA
DL : 0
东北大学编写的DES、RSA混合密码系统,完整可用。-prepared by the Northeastern University DES, RSA cryptosystem mixed, integrity available.
Update
: 2008-10-13
Size
: 270.88kb
Publisher
:
周艺红
[
Crack Hack
]
fdcmm
DL : 0
非对称密码的简单实现 毕业设计的-asymmetric cryptosystem to achieve a simple design of graduation .......................
Update
: 2008-10-13
Size
: 76.87kb
Publisher
:
anthony
[
Crack Hack
]
aes
DL : 0
This is an implentation of the RIJNDAEL cryptosystem.
Update
: 2008-10-13
Size
: 2.74kb
Publisher
:
zhenshanhong
[
Crack Hack
]
ibe-0.7
DL : 0
斯坦福大学密码学家Boneh的基于身份的公钥密码系统-Stanford University passwords Jurists Boneh the identity-based public-key cryptosystem
Update
: 2008-10-13
Size
: 96.75kb
Publisher
:
周渊
[
Crack Hack
]
2745ECC
DL : 0
椭圆曲线加密算法-elliptic curve cryptosystem
Update
: 2008-10-13
Size
: 17.19kb
Publisher
:
liye
[
Internet-Network
]
ibe-0.7.2
DL : 1
这是一个unix环境下实现基于身份的PKI系统源码,由stanford大学开发。采用了椭圆曲线密码公钥系统和配对椭圆曲线计算(Tate Pairing),具有非常高的效率.-This is a Unix-based environment PKI identity of the source system, developed by Stanford University. Use of Elliptic Curve Cryptosystem matching public key systems and elliptic curve calculation (Tate Pairing), with a very high efficiency.
Update
: 2008-10-13
Size
: 81.55kb
Publisher
:
叶润国
[
Crack Hack
]
RSA
DL : 0
RSA公开密钥密码系统是由R.Rivest,A.Shamir,L.Adleman提出的,不仅仅可用于数据的加密,也可用于数字签名。本程序提供了RSA加密和解密过程实现的源代码。-RSA public key cryptosystem by R. Rivest, A. Shamir, L. Adleman raised, not only can be used for data encryption, digital signatures can also be used. This procedure provides the RSA encryption and decryption process of the realization of the source code.
Update
: 2025-02-17
Size
: 648kb
Publisher
:
严玉洁
[
Other
]
Rabin_Cryptosystem
DL : 0
我的毕业论文及调研报告:《大模数的Rabin密码保密通信软件》 本文对Rabin密码保密通信软件进行了研究。简单介绍了信息安全技术现状及研究意义,讨论了公钥密码系统和Rabin密码系统及其涉及到的算法,包括大整数的实现、蒙格马利快速幂模运算、Miller-Rabin素性检测法、扩展的欧几里德算法。着重讨论了Rabin密码系统的方案设计以及Winsock通信技术。最后讲解了Rabin密码系统在保密通信中的应用,初步完成了大模数Rabin密码保密通信软件的设计。-My thesis and research report: Great modulus Rabin password secure communication software In this paper, Rabin password confidential communication software were studied. A brief introduction of the information security technology and research significance of the status quo, to discuss public-key cryptosystem and Rabin cryptosystem and involved in the algorithm, including the realization of large integers, Montgomery rapid computing power mode, Miller-Rabin primality test, Extended Euclidean algorithm. Focused on the Rabin cryptosystem Winsock program design and communication technologies. Finally on the Rabin cryptosystem secure communication applications, the initial completion of a large modulus Rabin password confidential communication software design.
Update
: 2025-02-17
Size
: 863kb
Publisher
:
周金月
[
matlab
]
RSA-public-key-cryptosystem
DL : 0
RSA公钥密码体制的matlab实现,这是密码学的加密算法之一-RSA public-key cryptosystem implementation of matlab, Cryptography This is one of the encryption algorithm
Update
: 2025-02-17
Size
: 1kb
Publisher
:
xiaotiantian
[
Crack Hack
]
AnImageEncryptionSchemeBasedonChaoticMap
DL : 0
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security cryptosystem.
Update
: 2025-02-17
Size
: 1.05mb
Publisher
:
ff
[
Software Engineering
]
A-novel-cryptosystem-based-on-grey-system-theory-
DL : 0
A novel cryptosystem based on grey system theory and genetic algorithm
Update
: 2025-02-17
Size
: 132kb
Publisher
:
said
[
Crack Hack
]
criptosistemaFinal
DL : 0
color image cryptosystem
Update
: 2025-02-17
Size
: 494kb
Publisher
:
cs1400
[
Crack Hack
]
spatio
DL : 0
Cryptanalysis of a spatiotemporal chaotic cryptosystem
Update
: 2025-02-17
Size
: 596kb
Publisher
:
cs1400
[
Crack Hack
]
Multi
DL : 0
Cryptanalysis of a multi-chaotic systems based image cryptosystem
Update
: 2025-02-17
Size
: 133kb
Publisher
:
cs1400
«
1
2
3
4
5
6
7
8
9
10
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.