搜索结果

找到约 26 项符合 cryptographic 的查询结果

Java编程 Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the N

Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
https://www.eeworm.com/dl/633/490265.html
下载: 25
查看: 1173

加密解密 Snefru is a cryptographic hash function invented by Ralph Merkle which supports 128-bit and 256-bit

Snefru is a cryptographic hash function invented by Ralph Merkle which supports 128-bit and 256-bit output.
https://www.eeworm.com/dl/519/361195.html
下载: 174
查看: 1071

加密解密 Delphi Cryptographic API Hash example using MD2 MD4 MD5 SHA1 GOST

Delphi Cryptographic API Hash example using MD2 MD4 MD5 SHA1 GOST
https://www.eeworm.com/dl/519/414079.html
下载: 112
查看: 1094

文章/文档 L0phtCrack是在NT平台上使用的口令审计工具。它能通过保存在NT操作系统中cryptographic hashes列表来破解用户口令的。

L0phtCrack是在NT平台上使用的口令审计工具。它能通过保存在NT操作系统中cryptographic hashes列表来破解用户口令的。
https://www.eeworm.com/dl/652/184120.html
下载: 112
查看: 1118

加密解密 fips1402.pdf

关于美国fips140的文档 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
https://www.eeworm.com/dl/501088.html
下载: 2
查看: 1085

加密解密 This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message au

This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared secret key. The cryptographic strength of HMAC de ...
https://www.eeworm.com/dl/519/303374.html
下载: 76
查看: 1055

文章/文档 this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryp

this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.
https://www.eeworm.com/dl/652/417795.html
下载: 43
查看: 1085

技术资料 国密算法和国际密码算法在车载单片机上应用的对比研究

文章介绍了车载网络安全和密码学应用的研究现状,结合前人的研究分析了国密SM4、SM3、SM2算法和对应国际密码算法的差异。在可编程的硬件加密模块上进行实验,从软件执行时间、运行内存占用等方面对比了国密算法和国际密码算法的性能。结果表明,国密SM系列算法和对应国际密码算法占用大小相当的运行内存,任何一种国密算法和对 ...
https://www.eeworm.com/dl/895603.html
下载: 9
查看: 6254

加密解密 The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which impl

The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which implements an extensible provider model that allows you to load a provider by specifying the required cryptographic algorithm rather than having to hardcode a specific provider.
https://www.eeworm.com/dl/519/347325.html
下载: 40
查看: 1094

VC书籍 Secure Programming Cookbook for C and C++ is an important new resource for developers serious about

Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, sy ...
https://www.eeworm.com/dl/686/192064.html
下载: 129
查看: 1113