Cryptography
共 61 篇文章
Cryptography 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 61 篇文章,持续更新中。
10 C++ Books: *C++ Timesaving Techniques For Dummies (2005) *C-C++ Programmer s Reference, 3rd Edi
10 C++ Books:
*C++ Timesaving Techniques For Dummies (2005)
*C-C++ Programmer s Reference, 3rd Edition (2003)
*Creating Games In C++ - A Step By Step Guide (2006)
*Cryptography In C And C++ (2001)
CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2
CCISP考试指南与导读
CISSP STUDY NOTES FROM CISSP PREP GUIDE 1
DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2
DOMAIN 2 – ACCESS CONTROL SYSTEMS 7
DOMAIN 3 – TELECOM AND NETWORK SECURITY 13
DOMAIN 4 – CRYPTOG
this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryp
this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.
As3 Crypto is a cryptography library written in Actionscript 3 that provides several common algorith
As3 Crypto is a cryptography library written in Actionscript 3 that provides several common algorithms. This version also introduces a TLS engine (TLS is commonly known as SSL.)
Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996
Handbook of Applied Cryptography, by A. Menezes, P. van
Oorschot, and S. Vanstone, CRC Press, 1996
a very popular packet of cryptography tools,it encloses the most common used algorithm and protocols
a very popular packet of cryptography tools,it encloses the most common used algorithm and protocols
John.Wiley.&.Sons.Cryptography.for.Dummies.eBook-LiB John wiley & sons 出版的加密算法介绍与入门书籍
John.Wiley.&.Sons.Cryptography.for.Dummies.eBook-LiB John wiley & sons 出版的加密算法介绍与入门书籍
Ad Hoc网是一种不依赖于任何固定基础设施、没有中心控制节点、计算资源受限的新型无线移动网络.基于ECC(elliptic curves cryptography),提出了一个新的适用于Ad Hoc
Ad Hoc网是一种不依赖于任何固定基础设施、没有中心控制节点、计算资源受限的新型无线移动网络.基于ECC(elliptic curves cryptography),提出了一个新的适用于Ad Hoc网的具有口令认证和共享口令进化的多方密钥协商方案.口令的一个功能是作为共享信息认证移动节点的密钥,另一个功能是作为对称密钥加密移动节点间的交互信息.共享口令进化机制保证每次认证节点密钥和协商会话密钥时
浅谈VB.NET的密码算法及其在信息安全中的应用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Inf
浅谈VB.NET的密码算法及其在信息安全中的应用
Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity
,介绍了Microsoft的最新开发工具Visual Basic 2005(简称VB.NET)中与密码算法相关的System.Security.Cryptog
Handbook of Applied Cryptography CRC Press ISBN: 0-8493-8523-7 October 1996, 816 pages
Handbook of Applied Cryptography
CRC Press
ISBN: 0-8493-8523-7
October 1996, 816 pages
Handbook of Applied Cryptography CRC Press ISBN: 0-8493-8523-7 October 1996, 816 pages
Handbook of Applied Cryptography
CRC Press
ISBN: 0-8493-8523-7
October 1996, 816 pages
java source code for cryptography, including all kinds of classes.
java source code for cryptography,
including all kinds of classes.
Oreilly_Java_Cryptography EBOOK SOURCE CODE
Oreilly_Java_Cryptography EBOOK SOURCE CODE
Cryptography handbook
Cryptography handbook
The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which impl
The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which implements an extensible provider model that allows you to load a provider by specifying the required cr
applied cryptography ebook by bruce scheneier
applied cryptography ebook by bruce scheneier
THIS IS GOOD PROJECT OF CRYPTOGRAPHY
THIS IS GOOD PROJECT OF CRYPTOGRAPHY
Handbook of Applied Cryptography (Algorithms, Mathematics, Science, Source Code)
Handbook of Applied Cryptography (Algorithms, Mathematics, Science, Source Code)
Java Cryptography and source code
Java Cryptography and source code
using System.Security.Cryptography
using System.Security.Cryptography