资源列表
[CA认证] discrete_log
说明:Solve descrete log problem using meet in the middle attack. More formally, write a program to compute discrete log modulo a prime p. Let g be some element in Z p and suppose you are given h in Z p such that h = gx where 1 ≤ x ≤ 240. Your goal<jitender grover> 在 2025-06-12 上传 | 大小:1kb | 下载:0
[CA认证] diffie_hellman
说明:Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random number mod p. Now generate A,<jitender grover> 在 2025-06-12 上传 | 大小:1kb | 下载:0
[CA认证] q1
说明:Consider an organization with three roles: A, B and C. Whenever B has to issue some instruction to A, B has to take permission via C and then only it will be obeyed by A. This permission is issued with the help of a digital signature. A verifies<jitender grover> 在 2025-06-12 上传 | 大小:1kb | 下载:0
[CA认证] mbedtls-2.4.0-apache
说明:mbed-tls加密库源码,arm收购自polarssl-Mbed-tls encrypt library source code, polarssl has been sold to ARM and renamed.<zyb> 在 2025-06-12 上传 | 大小:1.83mb | 下载:0
[CA认证] Hill-Cipher
说明:Encryption algorithm of Hill cipher with GUI in c#<Hasnain> 在 2025-06-12 上传 | 大小:48kb | 下载:0
[CA认证] AES-Assignment-1.3
说明:AES algorithm implementation in c# with GUI<Muhammad Hasnain> 在 2025-06-12 上传 | 大小:53kb | 下载:0
[CA认证] RSA-Assignment-2.1
说明:RSA algorithm implementation in c# using GUI<Muhammad Hasnain> 在 2025-06-12 上传 | 大小:53kb | 下载:0
[CA认证] LL-encryption
说明:图像加密代码,可以利用混沌理论对灰度图像加密和解密。-Image encryption code, you can use chaotic theory to grayscale image encryption and decryption<雷烈> 在 2025-06-12 上传 | 大小:1kb | 下载:0
[CA认证] free-hex-editor-neo
说明:hex editor to break hex code of software which are written in hex.<nikhil> 在 2025-06-12 上传 | 大小:16.22mb | 下载:0