Cryptographic

共 26 篇文章
Cryptographic 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 26 篇文章,持续更新中。

国密算法和国际密码算法在车载单片机上应用的对比研究

<p>文章介绍了车载网络安全和密码学应用的研究现状,结合前人的研究分析了国密SM4、SM3、SM2算法和对应国际密码算法的差异。在可编程的硬件加密模块上进行实验,从软件执行时间、运行内存占用等方面对比了国密算法和国际密码算法的性能。结果表明,国密SM系列算法和对应国际密码算法占用大小相当的运行内存,任何一种国密算法和对应的国际密码算法在软件执行速度方面都存在差异,但算法执行时间的差别最大不超过31

Physical Layer Security in Wireless Communications

The ever-increasing demand for private and sensitive data transmission over wireless net-<br /> works has made security a crucial concern in the current and future large-scale, dynamic,<br /> and hete

A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digi

A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certific

Cryptographic Key Generation from Voice

Cryptographic Key Generation from Voice

Delphi Cryptographic API Hash example using MD2 MD4 MD5 SHA1 GOST

Delphi Cryptographic API Hash example using MD2 MD4 MD5 SHA1 GOST

This document describes detailed cryptographic procedures for wireless system applications

This document describes detailed cryptographic procedures for wireless system applications

A Linux port of the OpenBSD/FreeBSD Cryptographic Framework (OCF). This port aims to bring full asyn

A Linux port of the OpenBSD/FreeBSD Cryptographic Framework (OCF). This port aims to bring full asynchronous HW/SW crypto acceleration to the Linux kernel, OpenSwan, OpenSSL and applications using DES

《为Windows Vista编写安全的代码》

《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges develop

Secure Programming Cookbook for C and C++ is an important new resource for developers serious about

Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companio

加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an

加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate

capicom xenroll cab dll

为了支持密码编译功能,微软在 Windows API 之中加入了 Cryptographic API (CryptoAPI)??,然而 CryptoAPI 的使用方法相当复杂,为了简化 CryptoAPI 的使用,微软即将它以 COM 的方式包装成 CAPICOM?,让应用程序只需要利用 COM 调用方式,即可使用 CryptoAPI。

fips1402.pdf

关于美国fips140的文档 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES

Kismet is an 802.11b network sniffer and network dissector. It is capable of sniffing using most wir

Kismet is an 802.11b network sniffer and network dissector. It is capable of sniffing using most wireless cards, automatic network IP block detection via UDP, ARP, and DHCP packets, Cisco equipment li

Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the N

Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Sta

this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryp

this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.

L0phtCrack是在NT平台上使用的口令审计工具。它能通过保存在NT操作系统中cryptographic hashes列表来破解用户口令的。

L0phtCrack是在NT平台上使用的口令审计工具。它能通过保存在NT操作系统中cryptographic hashes列表来破解用户口令的。

Snefru is a cryptographic hash function invented by Ralph Merkle which supports 128-bit and 256-bit

Snefru is a cryptographic hash function invented by Ralph Merkle which supports 128-bit and 256-bit output.

A thesis on developing multiple-precision integer libraries for cryptographic and other uses.

A thesis on developing multiple-precision integer libraries for cryptographic and other uses.

This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message au

This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved crypt

an ebook describing cryptographic protocols in a suitable way for developers to implement them easil

an ebook describing cryptographic protocols in a suitable way for developers to implement them easily in certain ways.