资源列表
[CA认证] Substitution
说明:无序替换加密,通过词频确定密钥,python代码。-Disorderly replace encryption by determining the key word frequency, python code.<大美女> 在 2025-05-22 上传 | 大小:1kb | 下载:0
[CA认证] encryptastring-in-delphi
说明:GOOD AND SIMPLE FUNCTION TO ENCODE STRINGS IN DELPHI<Mrbencdr> 在 2025-05-22 上传 | 大小:1kb | 下载:0
[CA认证] Double-random-phase-encoding-in-Fourier-domain.ra
说明:DRP ENCRYPTIO VOICE PHOTO QUALITY MEASUREMENTS<elsayed elshamy> 在 2025-05-22 上传 | 大小:1kb | 下载:0
[CA认证] RSA_SEC1
说明:security project about RSA algorithm this project is important for the students at the last year in the faculity<Mohammed Abu Arab> 在 2025-05-22 上传 | 大小:1kb | 下载:0
[CA认证] prob3
说明:Miller-Rabin test is a primality test algorithm which determines whether a given number is prime or not. Implement Miller-Rabin primality test as given in the text book page 257, Algorithm 7.44. (aN− 1 6= 1 mod<jitender grover> 在 2025-05-22 上传 | 大小:1kb | 下载:0
[CA认证] 4
说明:Cryptographic Hash Functions: A cryptographic hash function must have at least two security properties: collision free and Hiding. Collision free property ensures that for a given function H, no one can find x and y<jitender grover> 在 2025-05-22 上传 | 大小:1kb | 下载:0
[CA认证] discrete_log
说明:Solve descrete log problem using meet in the middle attack. More formally, write a program to compute discrete log modulo a prime p. Let g be some element in Z p and suppose you are given h in Z p such that h = gx<jitender grover> 在 2025-05-22 上传 | 大小:1kb | 下载:0
[CA认证] diffie_hellman
说明:Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random<jitender grover> 在 2025-05-22 上传 | 大小:1kb | 下载:0