Sort by
  1. Language:All
  2. Category:Crypt/Decrypt algrithms
  3. Time:ALL
  4. View:1000 times
Remove all
Language More Hide
Category More Hide
Time
View
More

PKI system implementation (Java)

Application backgroundThe functions of PIK are: generation, verification and distribution of keys, signature and verification; acquisition of certificate; certificate of verification; certificate of preservation; application for revocation of certificates; recovery of key; CRL; key update; cross cer...

SM2.SM3.SM4 code and data

Very detailed SM2, SM4, SM3 algorithm and C language code, the state secret Bureau of public algorithm....

RSA algorithm in TCL

Due to some security simulation on NS2, in this page, I tried to introduce the RSA algorithm. It is a good candidate for WSN , MANET , VANET , FRID , BANET, and any system that concern about packet confidentially and digital signature ....

EVRC complete source compression decompression algorithms, with a simple example...

EVRC complete source compression decompression algorithms, with a simple example program....

Digital signature (the complete code)

This is a complete list of digital signature process, including key distribution management, extraction of abstract, on the Eclipse test was successful....

ABE加密(Attribute

Source code for ABE(Attribute-Based Encryption)...

Elgamal encryption algorithm

This is a very good source for a lot of children's shoes are very good sources of, and the procedures are easy to understand. This program is running in the VISUAL C++6.0, but should also be able to run on a different version of the software....


LOGIN

Don't have an account? Register now
Need any help?
Mail to: support@codeforge.com

切换到中文版?

CodeForge Chinese Version
CodeForge English Version

Where are you going?

^_^"Oops ...

Sorry!This guy is mysterious, its blog hasn't been opened, try another, please!
OK

Warm tip!

CodeForge to FavoriteFavorite by Ctrl+D