Welcome![Sign In][Sign Up]
Location:
Search - digital signatures.rar

Search list

[JSP/Java数字签名

Description: 进行数字签名的小程序-digital signatures of the small programs
Platform: | Size: 1024 | Author: 封硕 | Hits:

[VC/MFCElGamal

Description:  ElGamal算法既能用于数据加密也能用于数字签名,其安全性依赖于计算有限域上离散对数这一难题。 密钥对产生办法。首先选择一个素数p,两个随机数, g 和x,g, x < p, 计算 y = g^x ( mod p ),则其公钥为 y, g 和p。私钥是x。g和p可由一组用户共享。 ElGamal用于数字签名。被签信息为M,首先选择一个-ElGamal algorithm not only used for data encryption can be used for digital signatures, their safety depends on the calculation of a finite field discrete logarithm this problem. Key to the method. First of all, choose a prime number p, the two random numbers, g and x, g, x <p, computing y = g ^ x (mod p), for its public key y, g and p. Private key is x. g and p by a group of users to share. ElGamal for digital signatures. Information was signed M, first choose a
Platform: | Size: 1024 | Author: 修凤志 | Hits:

[Crack HackElgamal

Description: 本项目实现Elgalma体制的加解密,公私钥生成后分别放于不同的文件中。用该密码体制实现了对任意数据类型的加解密以及实现了数据签名验证算法。本项目中我实现的是32位的算法。其中,数字签名验证算法是对hash摘要值(SHA-1算法产生的)进行签名,并进行验证。-The project implementation Elgalma system encryption and decryption, public and private key to generate, after put in a different file. Cryptosystem with the implementation of arbitrary data types as well as the implementation of encryption and decryption of data Signature verification algorithm. I realize this project are the 32 algorithms. Among them, the digital signature verification algorithm is a summary hash value (SHA-1 algorithm generated) for signatures, and verify it.
Platform: | Size: 4096 | Author: 蔡吉欣 | Hits:

[CA authDecrypt.rar

Description: 加密的几种常用的源码包,应用于数据库表部分字段的加密,图象文件等文档加密,双方通信时数据加密传输防他人网络截取信息。非对称RSA或ECC公钥加密私钥解密或者可用于数字签名 对称加密AES或者DES,56位的DES加密,128位或192位或256位AES加解密通常可设随便的密码长度,其它位用常字符代替;非对称加密多要先因式分解,对称加密多就移位处理。,Several common source package encryption, encryption, image files, and other document encryption applied to the part of the field of the database table, the two sides communicate data encryption transmission Anti others network interception. The asymmetric RSA or ECC public key to encrypt the private key to decrypt or can be used for digital signatures symmetric encryption AES or DES, 56-bit DES encryption, 128-bit or 192-bit or 256-bit AES encryption and decryption usually can be set casually password length, other bits instead of using the regular characters asymmetric encryption first multi factorization, symmetric encryption shift process.
Platform: | Size: 212992 | Author: 曾祥园 | Hits:

CodeBus www.codebus.net