搜索结果
找到约 46 项符合
CRYPTO 的查询结果
按分类筛选
加密解密 use the base function Crypto API for crypt/decrypt message and view cryptoproviders in your system.(
use the base function Crypto API for crypt/decrypt message and view cryptoproviders in your system.(console application)
加密解密 There is a DES crypto programm. Only for lab. To make some mesurements. And some Heming scheme s in
There is a DES crypto programm. Only for lab. To make some mesurements. And some Heming scheme s in a EWB (Electronic work Bench)
加密解密 a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded s
a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asym ...
手册 CRYPTO AN0955
This document describes the use of the CRYPTO acceleration module of the EFM32 Gemstones, including support for ECC, SHA, AES block ciphers, and authenticated encryption algorithms.
加密解密 一个还算高效的AES加密组件
一个还算高效的AES加密组件,应用了Crypto++加密算法库,对学习该库的人会有一些帮助
其他嵌入式/单片机内容 是现在非常流行的network processor上的微代码的编程
是现在非常流行的network processor上的微代码的编程,是其中基于最新的IXP2850的crypto units的ipsec的一个例子,告诉大家如何利用已有的宏以及调用硬件资源。
Windows Mobile Most code samples included on this CD were developed with Microsoft Visual C++ version 5.0 and the M
Most code samples included on this CD were developed with Microsoft Visual C++ version 5.0 and the Microsoft Windows CE Toolkit for Visual C++ version 5.0. The Sspi and Crypto samples were developed with Microsoft Visual C++ version 6.0 and the Microsoft Windows CE Toolkit for Visual C++ 6.0. The co ...
加密解密 这是一个简单的文件加密的例子
这是一个简单的文件加密的例子,该例子采用了Crypto Api实现文件的加密,例子中可以使用不同的算法,对称加密文件
加密解密 The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption sche
The Stanford IBE library is a C implementation of the Boneh-Franklin
identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based
Encryption from the Weil Pairing", CRYPTO 2001.)
There are a few modifications and additions. The Boneh-Franklin scheme is
used as a Key Encapsulation Mech ...