cipher
共 39 篇文章
cipher 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 39 篇文章,持续更新中。
用PIC17C42实现数据加密标准运算法则
In January 1977, The United States government<BR>adopted a product cipher developed by IBM as its of
IC卡系统智能设计及多方信任计算理论研究.rar
智能卡已广泛应用于身份合法性鉴别、数据存储或传输的私密性与完整性、信息交互的抗抵赖性以及移动计算等信息处理和信息安全领域。随着智能卡应用的不断深入,围绕着智能卡应用安全开展的理论和策略研究、芯片设计和产品开发既是学术界研究的热点,也是产业界关注的焦点。针对智能卡应用开展安全架构、安全协议、安全策略、密码理论、密钥管理、可信交易等理论研究,利用嵌入式系统智能设计理念,将理论研究成果应用于智能卡的硬件
I try to create GUI using Matlab to code hills polygraph cipher
I try to create GUI using Matlab to code hills polygraph cipher
VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in li
VHDL implementation of the twofish cipher for 128,192 and 256 bit keys.
The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemen
算法编程题,北京大学OnlineJudge 1026Cipher
算法编程题,北京大学OnlineJudge
1026Cipher
Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2
Playfair Cipher
1.not even the large number of keys in a monoalphabetic cipher provides security
2.one approach to improving security was to encrypt multiple letters
3.the Playfair Cipher is an exa
MICKEY 2.0 STREAM CIPHER IMPLEMENTATION IN VISUAL C++
MICKEY 2.0 STREAM CIPHER IMPLEMENTATION IN VISUAL C++
The secret cipher that secures Mifare Classic RFID tags used in access control systems, subway tick
The secret cipher that secures Mifare Classic RFID tags used in access control systems, subway
tickets, and various other security-related applications has recently been disclosed
The files included implement the M3 Enigma machine. Rotors.m implements the GUI and enigma.m impleme
The files included implement the M3 Enigma machine. Rotors.m implements the GUI and enigma.m implements the cipher substitutions. The implementation can be used as an aid to teaching the enigma machin
fwknop stands for "Firewall Knock Operator" and is an upcoming piece of software that will be releas
fwknop stands for "Firewall Knock Operator" and is an upcoming piece of software that will be released at the DEFCON 12 conference in July, 2004 in Las Vegas.
fwknop implements network access contr
caesar cipher 分析 能够分析单个替代的caesar cipher
caesar cipher 分析 能够分析单个替代的caesar cipher
Vegenere Cipher is a kind of encryption it only can cipher the char pliantext
Vegenere Cipher is a kind of encryption it only can cipher the char pliantext
Low frequency NXP hitag2 encryption cipher This the low frequency NXP hitag2 encryption cipher.
Low frequency NXP hitag2 encryption cipher
This the low frequency NXP hitag2 encryption cipher.
The package hitag2.zip contains the following files:
hitag2.png - Cipher overview
hitag2.c - Sou
Column permutation cipher是基于置换的加密解密方式。利用本程序可实现Column permutation cipher的加密和解密。
Column permutation cipher是基于置换的加密解密方式。利用本程序可实现Column permutation cipher的加密和解密。
This file contains a C++Builder 4 project called SimplyChaos-X ver 3.1 (SCX31). SCX31 is an encry
This file contains a C++Builder 4 project called SimplyChaos-X ver 3.1 (SCX31).
SCX31 is an encryption tool. I designed it as my graduation paper work. SCX31 is a symmetric stream cipher built on c
Vigenere_Cipher_.zip 密码学经典加密解密算法 vc++实现
Vigenere_Cipher_.zip 密码学经典加密解密算法 vc++实现
1.本程序将所有可能出现的英文和符号定义在ASCII表中的“000--255”中的256个常用字符 2.在实现2的基础上
1.本程序将所有可能出现的英文和符号定义在ASCII表中的“000--255”中的256个常用字符
2.在实现2的基础上,实现控制台对英文文本文件(注意明文和密文都以文件形式存在)的加解密
形式:cipher 源文件名 目的文件名 密钥 E/D(标示加解密)说明:对于加密来说,源文件名就是明文,对于解密来说,源文件名就是密文
trivium_p3
This document specifies trivium, a hardware oriented synchronous stream cipher which aims to provide a flexible trade-off between speed and area.
用java编写的AES加密解密程序,程序需要同目录下有key.dat作为加密解密密钥,输出密文cipher.dat,输出解密文件descrypt.dat
用java编写的AES加密解密程序,程序需要同目录下有key.dat作为加密解密密钥,输出密文cipher.dat,输出解密文件descrypt.dat
The file is substitution cipher assistant.It Will display the ciphertext underneath the guessed plai
The file is substitution cipher assistant.It Will display the ciphertext underneath the guessed plaintext.