代码搜索:Encryption

找到约 4,642 项符合「Encryption」的源代码

代码结果 4,642
www.eeworm.com/read/494289/6381690

txt ibe.txt

IBE This Identity Based Encryption method was invented by Boneh & Franklin. See http://crypto.stanford.edu/ibe/ for more details. This demonstration implementation consists of four programs th
www.eeworm.com/read/494289/6381755

cpp ibe_decx.cpp

/* Boneh & Franklin's Identity Based Encryption y^2=x^3+x version Using this curve has certain advantages. In particular the "denominator" that arises in the context of Miller's a
www.eeworm.com/read/481033/6655918

h testdes.h

/* DES test vectors, derived from "Validating the Correctness of Hardware Implementations of the NBS Data Encryption Standard", NBS Special Publication 500-20, 1980, reprinted in NIST Pub.800-
www.eeworm.com/read/156954/11750719

h helix.h

/* Module : Helix.H Purpose: C++ class to encapsulate the Helix Encryption and Authentication algorithm as presented in a November 2003 Dr. Dobb's Journal article by Niels Ferguson and Br
www.eeworm.com/read/156908/11753478

txt ibe.txt

IBE This Identity Based Encryption method was invented by Boneh & Franklin. See http://crypto.stanford.edu/ibe/ for more details. This demonstration implementation consists of four programs th
www.eeworm.com/read/156908/11753605

cpp ibe_decx.cpp

/* Boneh & Franklin's Identity Based Encryption y^2=x^3+x version Using this curve has certain advantages. In particular the "denominator" that arises in the context of Miller's a
www.eeworm.com/read/127767/14336644

txt e471. generating a secret key using the diffie-hellman key agreement algorithm.txt

Two parties use a key agreement protocol to generate identical secret keys for encryption without ever having to transmit the secret key. The protocol works by both parties agreeing on a set of values
www.eeworm.com/read/127767/14337858

txt e470. generating a parameter set for the diffie-hellman key agreement algorithm.txt

Two parties use a key agreement protocol to generate identical secret keys for encryption without ever having to transmit the secret key. The protocol works by both parties agreeing on a set of values
www.eeworm.com/read/120626/14796652

h loki.h

/* * loki.h - specifies the interface to the LOKI encryption routines. * This library proviloki routines to expand a key, encrypt and * decrypt 64-bit data blocks. The LOKI Data Encrypt
www.eeworm.com/read/119531/14827108

h loki.h

/* * loki.h - specifies the interface to the LOKI encryption routines. * This library proviloki routines to expand a key, encrypt and * decrypt 64-bit data blocks. The LOKI Data Encrypt