您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. AES加密模式(ECB,CBC,CFB,OFB,CTR)

  2. NIST标准,AES加密模式介绍包括(ECB,CBC,CFB,OFB,CTR)。This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB
  3. 所属分类:网络安全

    • 发布日期:2015-07-15
    • 文件大小:262144
    • 提供者:hweethy
  1. C#BouncyCastle1.7Dll文件

  2. eneration and parsing of PKCS#12 files. ■X.509: Generators and parsers for V1 and V3 certificates, V2 CRLs and attribute certificates. ■PBE algorithms supported by PBEUtil: PBEwithMD2andDES-CBC, PBEwithMD2andRC2-CBC, PBEwithMD5andDES-CBC, PBEwithMD5
  3. 所属分类:C#

    • 发布日期:2015-09-01
    • 文件大小:461824
    • 提供者:dyq51
  1. nmap-6.49BETA5.tar

  2. nmap的源代码 需要学习的下载了 LICENSE ISSUES ============== The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually bo
  3. 所属分类:网络安全

    • 发布日期:2015-11-06
    • 文件大小:8388608
    • 提供者:ovoing
  1. Berkeley DB API

  2. Berkeley DB releases optionally include strong cryptographic support; this release DOES contain cryptographic support. Export/import and/or use of cryptography software, or even communicating technical details about cryptography software, is illegal
  3. 所属分类:其它

    • 发布日期:2008-11-14
    • 文件大小:3145728
    • 提供者:huaxingqian830
  1. Windows MicroXP 0.82[Microsoft Windows XP SP3原版加工成的微型XP系统,=99.9%个完整XP]

  2. With a total installation size of just 200Mb and a CD size of just 99.9Mb, this has to be one of the smallest Windows XP installations out there. Whats more - you can use 99% of the programs you always use and up to now there is not one single repor
  3. 所属分类:Web开发

    • 发布日期:2008-11-16
    • 文件大小:8192
    • 提供者:vicle
  1. Mastering Python Forensics(PACKT,2015)

  2. Digital forensic analysis is the process of examining and extracting data digitally and examining it. Python has the combination of power, expressiveness, and ease of use that makes it an essential complementary tool to the traditional, off-the-shel
  3. 所属分类:Python

    • 发布日期:2016-01-04
    • 文件大小:2097152
    • 提供者:vanridin
  1. QCA在Windows上用MinGW的编译过程

  2. QCA是Qt Cryptographic Architecture的缩写,简而言之就是安全组件(如OpenSSL)的Qt封装,方便Qt程序调用。
  3. 所属分类:QT

    • 发布日期:2016-01-15
    • 文件大小:15360
    • 提供者:witch1990
  1. Handbook of Applied Cryptography(一个文档)

  2. 应用密码技术手册。经典文献 Chapter 1 - Overview of Cryptography Chapter 2 - Mathematics Background Chapter 3 - Number-Theoretic Reference Problems Chapter 4 - Public-Key Parameters Chapter 5 - Pseudorandom Bits and Sequences Chapter 6 - Stream Ciphers Chapter 7
  3. 所属分类:专业指导

    • 发布日期:2008-11-17
    • 文件大小:5242880
    • 提供者:dp282
  1. PyCrypto2.6.1 帮助文档

  2. Package Crypto:Python Cryptography Toolkit A collection of cryptographic modules implementing various algorithms and protocols. 来源于https://www.dlitz.net/software/pycrypto/api/current/,版权归原作者所有。
  3. 所属分类:Python

    • 发布日期:2016-04-22
    • 文件大小:252928
    • 提供者:zfaidz
  1. CRYTOPP563

  2. Crypto++ Library is a free C++ class library of cryptographic schemes. The library contains the following algorithms: algorithm type name authenticated encryption schemes GCM, CCM, EAX high speed stream ciphers ChaCha8, ChaCha12, ChaCha20, Panama, S
  3. 所属分类:C++

    • 发布日期:2016-04-25
    • 文件大小:1048576
    • 提供者:dgpuma
  1. RAPWare EasyCrypt for XE10 (Cracked Dcu)

  2. Easy Crypt brings the power of the Microsoft Cryptographic Technologies to your Delphi applications. With the provided components you get an easy way to hash, protect/unprotect, encrypt/decrypt strings and binary data. Both public/private-key and sy
  3. 所属分类:Delphi

    • 发布日期:2016-09-24
    • 文件大小:41943040
    • 提供者:tebox
  1. openssl10-libs-1.0.1e-1.ius.centos6.x86_64

  2. OpenSSL is a toolkit for supporting cryptography. The openssl-libs package contains the libraries that are used by various applications which support cryptographic algorithms and protocols.
  3. 所属分类:C

    • 发布日期:2016-09-26
    • 文件大小:790528
    • 提供者:u010858448
  1. Cloud.Computing.Security.Foundations.and.Challenges

  2. This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud
  3. 所属分类:网络安全

    • 发布日期:2016-10-20
    • 文件大小:45088768
    • 提供者:ramissue
  1. ICE 2.5 full source

  2. About ICE License Protection v2.0 : ICE License v2.0 is a new & innovative licensing protection solution designed to provide a high level of security. ICE License protects your application the executable file by code encryption to provide a strong p
  3. 所属分类:Web开发

    • 发布日期:2008-11-24
    • 文件大小:7340032
    • 提供者:i8dea
  1. Microsoft.Azure.Security.Infrastructure

  2. Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, sec
  3. 所属分类:网络安全

    • 发布日期:2017-01-12
    • 文件大小:9437184
    • 提供者:ramissue
  1. Android Security Internals An In-Depth Guide to Androids Security Architecture.

  2. In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security system. Elenkov describes Android security architecture from the bottom up, delving into the implementation of major security-
  3. 所属分类:系统安全

    • 发布日期:2017-07-16
    • 文件大小:7340032
    • 提供者:cqluck
  1. Mathematics in Computing

  2. Mathematics in Computing An Accessible Guide to Historical,Foundational and Application Contexts Author: Gerard O'Regan Springer, 2013 Contents 1 Mathematics in Civilization 1.1 Introduction 1.2 The Babylonians 1.3 The Egyptians 1.4 The Greeks 1.5 T
  3. 所属分类:讲义

    • 发布日期:2017-09-10
    • 文件大小:2097152
    • 提供者:stanley72
  1. Bulletproof SSL and TLS,PDF , Ivan Ristic

  2. Bulletproof SSL and TLS by Ivan Ristić Table of Contents Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
  3. 所属分类:网络基础

    • 发布日期:2017-09-27
    • 文件大小:7340032
    • 提供者:hintcnuie
  1. 蒙哥马利求模逆

  2. The basic arithmetic operations in modular arithmetic where the modulo is prime are a natural and inseparable part of cryptographic algorithms
  3. 所属分类:其它

    • 发布日期:2017-09-29
    • 文件大小:241664
    • 提供者:saint_joy
  1. BouncyCastle C#源码

  2. The Bouncy Castle Crypto package is a C\# implementation of cryptographic algorithms and protocols, it was developed by the Legion of the Bouncy Castle, a registered Australian Charity, with a little help! The Legion, and the latest goings on with t
  3. 所属分类:C#

    • 发布日期:2017-10-21
    • 文件大小:742400
    • 提供者:elvolam
« 1 2 3 4 5 6 78 9 10 11 12 13 14 »