用c语言写的,仅包含程序,要自己编译 /* LibTomCrypt, modular cryptographic library -- Tom St Denis * * LibTomCrypt is a library that provides various cryptographic * algorithms in a highly modular and flexible manner. * * The library is free for all purposes without
In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, secu
RAPWare Components 5.0.0.23 for Delphi 7-2009 Cracked Code: http://rapware.nlEasy MAPI MAPI is the messaging system used by Microsoft Outlook for email, contacts, appointments, tasks, sticky notes etc. With Easy MAPI you can use the Extended MAPI, S
Delphi加密控件支持D2009,支持多种加密方式,里面的演示示例。 Introduction: DCPcrypt is a collection of cryptographic components for the Borland Delphi(tm), C++ Builder(tm) and Kylix(tm) programming languages. The supported versions are Delphi 4, 5, 6, 7, 2005, C++ Builder (
Product Descr iption If your job is to design or implement IT security solutions or if youre studying for any security certification, this is the how-to guide youve been looking for. Heres how to assess your needs, gather the tools, and create a con
Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic implementations, and their targets range from primitives, protocols, modules, and devices to even systems. These attacks pose a serious threat to the security o
In several cryptographic systems, a fixed element g of a group of order N is repeatedly raised to many different powers. In this paper we present a practical method of speeding up such systems, using precomputed values to reduce the number of multi
This document, the Integrated Circuit Card (ICC) Specifications for Payment Systems - Book 2, Security and Key Management, describes the minimum security functionality required of integrated circuit cards (ICCs) and terminals to ensure correct opera
The AT88SCxxxxC is a family of 9 high-performance secure memory devices providing 1K to 256K bits of user memory with advanced built-in security and cryptographic features. The memory is divided into 4, 8 or 16 user zones each of which may be indivi
ISO/IEC 7816-2 Second edition 2007-10-15 Identification cards — Integrated circuit cards — Part 2: Cards with contacts — Dimensions and location of the contacts ISO/IEC 7816-2 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information tech
一本关于加密方面的书,希望大家喜欢!This specification is intended to satisfy the NIST Key Wrap requirement to: Design a cryptographic algorithm called a Key Wrap that uses the Advanced Encryption Standard (AES) as a primitive to securely encrypt a plaintext key(s) w