Sort by
  1. Language:All
  2. Category:Crypt/Decrypt algrithms
  3. Time:ALL
  4. View:1000 times
Remove all
Language More Hide
Category More Hide
Time
View
More

PKI system implementation (Java)

Application backgroundThe functions of PIK are: generation, verification and distribution of keys, signature and verification; acquisition of certificate; certificate of verification; certificate of preservation; application for revocation of certificates; recovery of key; CRL; key update; cross cer...

SM2.SM3.SM4 code and data

Very detailed SM2, SM4, SM3 algorithm and C language code, the state secret Bureau of public algorithm....

Digital signature (the complete code)

This is a complete list of digital signature process, including key distribution management, extraction of abstract, on the Eclipse test was successful....

ABE加密(Attribute

Source code for ABE(Attribute-Based Encryption)...

C语言环境下的AES加密算法,支持128位的AES加密。

C language environment AES encryption algorithm, support 128-bit AES encryption....

DES encryption algorithm for hardware implementation

The implementation uses a pipeline architecture, analysis of key and direct relationship to the original key, created using combinational logic 16 sub key, not only overall efficiency, and do not consume too many resources, by way of simulation, through sheer....


LOGIN

Don't have an account? Register now
Need any help?
Mail to: support@codeforge.com

切换到中文版?

CodeForge Chinese Version
CodeForge English Version

Where are you going?

^_^"Oops ...

Sorry!This guy is mysterious, its blog hasn't been opened, try another, please!
OK

Warm tip!

CodeForge to FavoriteFavorite by Ctrl+D