Sort by
  1. Language:All
  2. Category:Crypt/Decrypt algrithms
  3. Time:ALL
  4. View:100—300 times
Remove all
Language More Hide
Category More Hide
Time
View
More

SSL cyclone source code, can be transplanted in various types of embedded operating system, including the underlying code of a variety of chips

Application backgroundOn top of the transport layer of information encryption and decryption using SSL protocol, the source code for the C language, also includes an interface for all kinds of mainstream embedded operating system uc / OS-II, FreeRTOS, typical for all types of applications, such as T...

RSA encryption realize, I hope to be helpful to everyone to study the algorithm...

RSA encryption realize, I hope to be helpful to everyone to study the algorithm is a very painful thing, a lot of U.S. efforts...

IBE identity

IBE identity-based encryption system of the decryption process, using VC6.0 Development...

LDPC encoding and decoding procedures

LDPC encoding and decoding processes, reliable operation, primarily coding used for 4G. MATLAB programming, the core code is simple and reliable...

DES and 3DES algorithm source program, standard C implementation, can be used for unix/linux/windows platform.

Application backgroundCross platform DES and 3DES algorithm source program, standard C implementation, can be used for unix/linux/windows platform.And 3DES algorithm source code the, standard C implementation which, can be used for unix/linux/windows platform. -DESKey TechnologyDES: , key:  ...

IPSEC source code, including the test module code, easy to transplant

Application backgroundIn IP layer encryption IPSec source code, including each module test code, can tcpip protocol stack for specific transplant, I have in the uc/tcpip protocol stack for the transplantation, successful test, the realization of the multiple nodes in a local area network secure comm...

Uses encryption algorithm storehouse which VB writes, including Blowfish, IDEA,...

Uses encryption algorithm storehouse which VB writes, including Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms (SHA-1, SHA-256, MD2, MD4, MD...

prev 1 2 3 4 5 6 7 8 9 10 ... 29 next

LOGIN

Don't have an account? Register now
Need any help?
Mail to: support@codeforge.com

切换到中文版?

CodeForge Chinese Version
CodeForge English Version

Where are you going?

^_^"Oops ...

Sorry!This guy is mysterious, its blog hasn't been opened, try another, please!
OK

Warm tip!

CodeForge to FavoriteFavorite by Ctrl+D