Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program CA auth

Search in result

CA auth list
Sort by :
« 1 2 34 5 6 7 8 9 10 ... 232 »
Downloaded:1
By implementing the Digital Signature Algorithm (DSA), a better understanding of the digital signature algorithm, while learning to achieve Hash algorithm. 1) using the C \ C++ language DSA algorithms. 2) DSA of the Hash
Update : 2024-05-09 Size : 3kb Publisher : 查航

Downloaded:0
Miller-Rabin test is a primality test algorithm which determines whether a given number is prime or not. Implement Miller-Rabin primality test as given in the text book page 257, Algorithm 7.44. (aN− 1 6= 1 mod N) W
Update : 2024-05-09 Size : 1kb Publisher : jitender grover

Downloaded:0
Cryptographic Hash Functions: A cryptographic hash function must have at least two security properties: collision free and Hiding. Collision free property ensures that for a given function H, no one can find x and y such
Update : 2024-05-09 Size : 1kb Publisher : jitender grover

Downloaded:0
Solve descrete log problem using meet in the middle attack. More formally, write a program to compute discrete log modulo a prime p. Let g be some element in Z p and suppose you are given h in Z p such that h = gx where
Update : 2024-05-09 Size : 1kb Publisher : jitender grover

Downloaded:0
Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random number
Update : 2024-05-09 Size : 1kb Publisher : jitender grover

Downloaded:0
Consider an organization with three roles: A, B and C. Whenever B has to issue some instruction to A, B has to take permission via C and then only it will be obeyed by A. This permission is issued with the help of a digi
Update : 2024-05-09 Size : 1kb Publisher : jitender grover

Downloaded:0
Mbed-tls encrypt library source code, polarssl has been sold to ARM and renamed.
Update : 2024-05-09 Size : 1.83mb Publisher : zyb

Downloaded:0
THE ALGORITHM WRITTEN IN C FOR BOTH ENCRYPTION AND DESCRYPTION AND CAN BE USED AS SINGLE MODULE FOR 3- des ALGORITHM
Update : 2024-05-09 Size : 4kb Publisher : jospeh

Downloaded:0
Encryption algorithm of Hill cipher with GUI in c#
Update : 2024-05-09 Size : 48kb Publisher : Hasnain

Downloaded:0
AES algorithm implementation in c# with GUI
Update : 2024-05-09 Size : 53kb Publisher : Muhammad Hasnain

Downloaded:0
RSA algorithm implementation in c# using GUI
Update : 2024-05-09 Size : 53kb Publisher : Muhammad Hasnain

Downloaded:0
Image encryption code, you can use chaotic theory to grayscale image encryption and decryption
Update : 2024-05-09 Size : 1kb Publisher : 雷烈
« 1 2 34 5 6 7 8 9 10 ... 232 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.