NIST标准,AES加密模式介绍包括(ECB,CBC,CFB,OFB,CTR)。This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB
eneration and parsing of PKCS#12 files. ■X.509: Generators and parsers for V1 and V3 certificates, V2 CRLs and attribute certificates. ■PBE algorithms supported by PBEUtil: PBEwithMD2andDES-CBC, PBEwithMD2andRC2-CBC, PBEwithMD5andDES-CBC, PBEwithMD5
nmap的源代码 需要学习的下载了 LICENSE ISSUES ============== The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually bo
Berkeley DB releases optionally include strong cryptographic support; this release DOES contain cryptographic support. Export/import and/or use of cryptography software, or even communicating technical details about cryptography software, is illegal
With a total installation size of just 200Mb and a CD size of just 99.9Mb, this has to be one of the smallest Windows XP installations out there. Whats more - you can use 99% of the programs you always use and up to now there is not one single repor
Digital forensic analysis is the process of examining and extracting data digitally and examining it. Python has the combination of power, expressiveness, and ease of use that makes it an essential complementary tool to the traditional, off-the-shel
Package Crypto:Python Cryptography Toolkit A collection of cryptographic modules implementing various algorithms and protocols. 来源于https://www.dlitz.net/software/pycrypto/api/current/,版权归原作者所有。
Crypto++ Library is a free C++ class library of cryptographic schemes. The library contains the following algorithms: algorithm type name authenticated encryption schemes GCM, CCM, EAX high speed stream ciphers ChaCha8, ChaCha12, ChaCha20, Panama, S
Easy Crypt brings the power of the Microsoft Cryptographic Technologies to your Delphi applications. With the provided components you get an easy way to hash, protect/unprotect, encrypt/decrypt strings and binary data. Both public/private-key and sy
OpenSSL is a toolkit for supporting cryptography. The openssl-libs package contains the libraries that are used by various applications which support cryptographic algorithms and protocols.
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud
About ICE License Protection v2.0 : ICE License v2.0 is a new & innovative licensing protection solution designed to provide a high level of security. ICE License protects your application the executable file by code encryption to provide a strong p
Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, sec
In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security system. Elenkov describes Android security architecture from the bottom up, delving into the implementation of major security-
Mathematics in Computing An Accessible Guide to Historical,Foundational and Application Contexts Author: Gerard O'Regan Springer, 2013 Contents 1 Mathematics in Civilization 1.1 Introduction 1.2 The Babylonians 1.3 The Egyptians 1.4 The Greeks 1.5 T
The Bouncy Castle Crypto package is a C\# implementation of cryptographic algorithms and protocols, it was developed by the Legion of the Bouncy Castle, a registered Australian Charity, with a little help! The Legion, and the latest goings on with t