Location:
Search - secret
Search list
Description: 《Windows编程奥妙》,Windows编程最高阶图书,《Windwos高级编程》只能算进阶图书。该书作者是Boundcheck编写者之一。强力推荐。-"Windows programming secret," the most high-end Windows programming books, "Advanced Programming Windows" can only be described as intermediate books. The book's author is Boundcheck one of the authors. Strongly recommended.
Platform: |
Size: 4117504 |
Author: 刘肇 |
Hits:
Description: a C++ Class Library of Cryptographic Primitives
This library includes:
MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES,
IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC,
various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA,
NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser,
elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.-a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.
Platform: |
Size: 388096 |
Author: 刘永 |
Hits:
Description: API calls interception is the task that allows you to get access to some parts of others programs. Lots of programmers spend time developing and describing various methods that allow that access. Such methods are used in many anti-virus and anti-spyware applications. Besides, sometimes, intercepting can help you to find errors in your application. However, it is not a secret that some viruses use it too. I spent much time finding and understanding the technique of interception. I would like to describe the results of my research.-API calls interception is the task that all boasting you to get access to some parts of others prog rams. Lots of programmers spend time developin g and describing various methods that allow tha t access. Such methods are used in many anti-vir us and anti-spyware applications. Besides, sometimes, intercepting can help you to find errors in your application. However, it is not a secret that some viruses use it too. I s pent much time finding and understanding the te TECHNIQUE of interception. I would like to descri be the results of my research.
Platform: |
Size: 75776 |
Author: 李登煇 |
Hits:
Description: shamir的秘密分享机制的原文。秘密分享门限机制中,利用拉格朗日插值多项式来恢复。-shamir secret-sharing mechanism in the original language. Threshold secret sharing mechanism, the use of Lagrange polynomial interpolation to restore.
Platform: |
Size: 184320 |
Author: 黄海凌 |
Hits:
Description: Shamir秘密分享与恢复算法的VC++程序,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再得出主密钥。输入大数长度和份数可自行定义(默认是270位和不超过20份)。-Shamir secret sharing and recovery algorithm VC procedures, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion to restore the original polynomial, then come to the main key. Length and the importation of large numbers of shares to be defined (the default is 270 and not more than 20).
Platform: |
Size: 1963008 |
Author: linvg |
Hits:
Description: Shamir秘密分享算法的java实现,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再求出主密钥。-Shamir secret sharing algorithm to achieve the java, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion to restore the original polynomial, then calculated the main key.
Platform: |
Size: 5120 |
Author: linvg |
Hits:
Description: 对于要加密的文档,www有一套标准,约定用于加密的文档应当组成一定的格式.对于符合这个格式的xml文档,本程序能从中提前rsa加密密钥和明文进行加密.本程序还提供rsa密钥生成接口和加密解密接口.-regard to the encrypted files, www set of standards, agreement for encrypted files should be composed of a certain format. For the format of the xml document, The procedure to locate the advance rsa encryption key and the letter of encryption. The procedures also provide rsa key generation and processing interface secret decryption interface.
Platform: |
Size: 40960 |
Author: 黎之方 |
Hits:
Description: windows2000内核秘密 中文版 喜欢驱动的朋友有福了 -windows2000-core like the Chinese version of the secret-driven blessed Friend
Platform: |
Size: 4930560 |
Author: 蓝帝 |
Hits:
Description: C 语言编程精翠,编写质优无错程序秘决,华为内程序员必读书本!-Jing Cui C language programming, the preparation of high quality error-free process secret, Huawei within the programmers must-read books!
Platform: |
Size: 9075712 |
Author: 梁业轩 |
Hits:
Description: 实现信息的隐藏,将文本信息隐藏在BMP位图中,实现了信息的隐秘传输和数字水印-Realize the hidden information, the text information hidden in Bitmap BMP, the realization of the secret transmission of information and digital watermark
Platform: |
Size: 1024 |
Author: 王春辉 |
Hits:
Description: MTK平台绝密核心代码之 系统驱动,是学习研究MTK平台的重要代码,也是做其他类似平台开发的良好参考代码,贡献出来与大家分享。-MTK platform for top-secret code of the core system, is the study important MTK platform code, but also other similar platforms to do a good reference code, contribute to share with you.
Platform: |
Size: 412672 |
Author: 余爱军 |
Hits:
Description: pass.words是弱口令字典,是一个纯文本文件,每行一个口令,可以向里面添加候选口令。
pass.c是进行口令检查的c语言原程序,有两个命令行参数
-w file: 可以使用该选项指定口令字典
-P:默认情况下对/etc/shadow中的用户检查弱口令,可以使用该选项指定检查的文件
编译gcc –o pass pass.c –l crypt
由于要使用加密函数,所以要使用加密库crypt,使用选项-l crypt
运行程序:pass –w ./pass.words –p /etc/shadow
-pass.words is a weak password dictionary, is a plain text file, one per line password, you can add to the inside candidate password. Password pass.c is the c language of the original inspection procedures, there are two command-line parameters-w file: You can use the password option specifies a dictionary-P: By default on/etc/shadow user to check the weak password, you can use the option to specify the documents to check the compiler gcc-o pass pass.c-l crypt function due to the use of encryption, so the use of encryption library crypt, use the option-l crypt running the program: pass-w./pass.words-- p/etc/shadow
Platform: |
Size: 7168 |
Author: 莫松成 |
Hits:
Description: MTK平台绝密核心代码之文件驱动,希望对大家有用-MTK platform for top-secret code of the core file system, using C to prepare, in the hope that useful to everybody
Platform: |
Size: 91136 |
Author: jevons |
Hits:
Description: 提出一种基于统计特性的LSB密写分析方法,这种方法根据密写对原始数据统计特性的影响来判断秘密信息的有无.实验结果给出了不同阈值时的检测性能,当秘密信息量较大时,两类错误概率都可以得到有效控制.-This paper proposes a novel steganalysis technique based on the statistics method for LSB insertion, in which the change of statistical characteristic caused by information hiding is used to judge the presence of secret message. Numerical results show the performance of this developed method with different thresholds and, especially, both kinds of judgment error probability can be effectively controlled with the increase of embedded information.
Platform: |
Size: 218112 |
Author: boe |
Hits:
Description: shamir‘s secret sharing C语言源码,对密码分割合并实现秘密共享-shamir' s secret sharing C language source code for the password secret sharing to achieve the combined partition
Platform: |
Size: 245760 |
Author: iuhiuh |
Hits:
Description: 这是一本关于黑客技术揭秘与学习的基础书的电子版,分别从木马篇,工具篇和实战篇教会读者一些黑客的常用知识。-This is a book about hacking technology and learning based on Secret of the electronic version of books, articles from the horse, tools, articles and actual church papers readers knowledge of some commonly used by hackers.
Platform: |
Size: 537600 |
Author: 杨松 |
Hits:
Description: 实现了Thien在他的文章《secret image sharing》中提出的(r,n)门限秘密图像分存方案。-this program has relized the (r, n) threshold secret image sharing scheme that was proposed by Thien in his paper《secret image sharing》
Platform: |
Size: 967680 |
Author: 陈高 |
Hits:
Description: 多秘密共享代码 ,包含四个模型的实现。代码用c++编写,用vs2008做平台。-Multi-secret sharing code, including the realization of the four models.
Platform: |
Size: 9735168 |
Author: wangyanxi |
Hits:
Description: 研究秘密图像分享技术,利用秘密图像分享技术来实现加密。-How to Share a Secret.using Secret Image Sharing.
Platform: |
Size: 633856 |
Author: rustle |
Hits:
Description: Secret Service 201.2 (SRC) code source in delphi
Platform: |
Size: 887808 |
Author: Reeverb |
Hits:
« 12
3
4
5
6
7
8
9
10
...
50
»