Sort by
  1. Language:C
  2. Category:Crypt/Decrypt algrithms
  3. Time:ALL
  4. View:500—1000 times
Remove all
Language More Hide
Category More Hide

SSL cyclone source code, can be transplanted in various types of embedded operating system, including the underlying code of a variety of chips

Application backgroundOn top of the transport layer of information encryption and decryption using SSL protocol, the source code for the C language, also includes an interface for all kinds of mainstream embedded operating system uc / OS-II, FreeRTOS, typical for all types of applications, such as T...

DES and 3DES algorithm source program, standard C implementation, can be used for unix/linux/windows platform.

Application backgroundCross platform DES and 3DES algorithm source program, standard C implementation, can be used for unix/linux/windows platform.And 3DES algorithm source code the, standard C implementation which, can be used for unix/linux/windows platform. -DESKey TechnologyDES: , key:  ...

PolarSSL - Straightforward, Secure Communication

PolarSSL makes it trivially easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) products, facilitating this functionality with a minimal coding footprint....

Digital cinema package encryption software

The software is divided into two modules: package and release the cryptographic module module.• Packaged encrypted module: packaged encrypt video files, audio files of the package, and CPL files are generated, PKL file generation and local asset mapping creates a file MAP.asmap (management and key...

3 c language implementation of DES encryption algorithm

3 transition algorithm is DES encryption standard algorithm, in various areas of encryption at this stage there is still a wide range of applications, this file using c language 3-DES encryption algorithm, contain all the algorithm the encryption and decryption processes to the study of information...

128,192,256bit high standard algorithm

AES Is a new encryption standard, it is block cipher algorithm, the packet length 128 Bit key length 128bit 、 192bit 、 256bit Three, respectively, AES-128 、 AES-192 、 AES-256 。 AES is composed of three parts, for encryption, key and decrypt extension . This article written in c language...

ElGamal signature

Application background focus on satisfy the security issues using combined approach of RSA and symmetric key cryptography based on enhancement of ELGAMAL digital signature scheme. This scheme works by merging integer factorization problem and discrete logarithm problem. As a result it provides...

MD5 algorithm C language source code

Application backgroundThis library is the C language MD5 encryption source code, including MD5.c, MD5.h, TXT file MD5.txt and a test code testmd5.c. code in the ubuntu12.04 server version of the successful test.Key TechnologyDigest Algorithm MD5 Message (Chinese name as message digest algorithm fift...

B-M method (get minimum spanning 01 bit string primitive polynomial)

For simple linear shift register by a single, get a bunch of 01-bit sequences can be generated in this 01-bit string of minimum linear polynomial algorithm by BM (on the binary field)....


Don't have an account? Register now
Need any help?
Mail to:


CodeForge Chinese Version
CodeForge English Version

Where are you going?

^_^"Oops ...

Sorry!This guy is mysterious, its blog hasn't been opened, try another, please!

Warm tip!

CodeForge to FavoriteFavorite by Ctrl+D