代码搜索:Encryption
找到约 4,642 项符合「Encryption」的源代码
代码结果 4,642
www.eeworm.com/read/494289/6381690
txt ibe.txt
IBE
This Identity Based Encryption method was invented by Boneh & Franklin. See
http://crypto.stanford.edu/ibe/ for more details.
This demonstration implementation consists of four programs th
www.eeworm.com/read/494289/6381755
cpp ibe_decx.cpp
/*
Boneh & Franklin's Identity Based Encryption
y^2=x^3+x version
Using this curve has certain advantages. In particular the "denominator"
that arises in the context of Miller's a
www.eeworm.com/read/481033/6655918
h testdes.h
/* DES test vectors, derived from "Validating the Correctness of Hardware
Implementations of the NBS Data Encryption Standard", NBS Special
Publication 500-20, 1980, reprinted in NIST Pub.800-
www.eeworm.com/read/156954/11750719
h helix.h
/*
Module : Helix.H
Purpose: C++ class to encapsulate the Helix Encryption and Authentication algorithm as presented in
a November 2003 Dr. Dobb's Journal article by Niels Ferguson and Br
www.eeworm.com/read/156908/11753478
txt ibe.txt
IBE
This Identity Based Encryption method was invented by Boneh & Franklin. See
http://crypto.stanford.edu/ibe/ for more details.
This demonstration implementation consists of four programs th
www.eeworm.com/read/156908/11753605
cpp ibe_decx.cpp
/*
Boneh & Franklin's Identity Based Encryption
y^2=x^3+x version
Using this curve has certain advantages. In particular the "denominator"
that arises in the context of Miller's a
www.eeworm.com/read/127767/14336644
txt e471. generating a secret key using the diffie-hellman key agreement algorithm.txt
Two parties use a key agreement protocol to generate identical secret keys for encryption without ever having to transmit the secret key. The protocol works by both parties agreeing on a set of values
www.eeworm.com/read/127767/14337858
txt e470. generating a parameter set for the diffie-hellman key agreement algorithm.txt
Two parties use a key agreement protocol to generate identical secret keys for encryption without ever having to transmit the secret key. The protocol works by both parties agreeing on a set of values
www.eeworm.com/read/120626/14796652
h loki.h
/*
* loki.h - specifies the interface to the LOKI encryption routines.
* This library proviloki routines to expand a key, encrypt and
* decrypt 64-bit data blocks. The LOKI Data Encrypt
www.eeworm.com/read/119531/14827108
h loki.h
/*
* loki.h - specifies the interface to the LOKI encryption routines.
* This library proviloki routines to expand a key, encrypt and
* decrypt 64-bit data blocks. The LOKI Data Encrypt