use the base function CRYPTO API for crypt/decrypt message and view CRYPTOproviders in your system.(console application)
标签: CRYPTOproviders function decrypt message
上传时间: 2013-12-15
上传用户:851197153
There is a DES CRYPTO programm. Only for lab. To make some mesurements. And some Heming scheme s in a EWB (Electronic work Bench)
标签: some mesurements programm Heming
上传时间: 2017-08-08
上传用户:13188549192
a true random number generator (TRNG) in hardware which is targeted for FPGA-based CRYPTO embedded systems. All CRYPTO protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES.
标签: FPGA-based generator embedded hardware
上传时间: 2014-01-09
上传用户:一诺88
This document describes the use of the CRYPTO acceleration module of the EFM32 Gemstones, including support for ECC, SHA, AES block ciphers, and authenticated encryption algorithms.
标签: CRYPTO dongle
上传时间: 2016-12-28
上传用户:asula
一个还算高效的AES加密组件,应用了CRYPTO++加密算法库,对学习该库的人会有一些帮助
上传时间: 2014-11-26
上传用户:独孤求源
是现在非常流行的network processor上的微代码的编程,是其中基于最新的IXP2850的CRYPTO units的ipsec的一个例子,告诉大家如何利用已有的宏以及调用硬件资源。
上传时间: 2013-12-20
上传用户:yxgi5
Most code samples included on this CD were developed with Microsoft Visual C++ version 5.0 and the Microsoft Windows CE Toolkit for Visual C++ version 5.0. The Sspi and CRYPTO samples were developed with Microsoft Visual C++ version 6.0 and the Microsoft Windows CE Toolkit for Visual C++ 6.0. The code in sample applications is ported for a Handheld PC, but the programming concepts that are presented apply to all Windows CE-based platforms.
标签: Microsoft developed included samples
上传时间: 2015-07-10
上传用户:Pzj
用C做的,加解密。使用ms的CRYPTO API接口
标签:
上传时间: 2014-11-26
上传用户:caiiicc
这是一个简单的文件加密的例子,该例子采用了CRYPTO Api实现文件的加密,例子中可以使用不同的算法,对称加密文件
标签: 文件加密
上传时间: 2015-12-17
上传用户:xiaohuanhuan
The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based Encryption from the Weil Pairing", CRYPTO 2001.) There are a few modifications and additions. The Boneh-Franklin scheme is used as a Key Encapsulation Mechanism, and off-the-shelf ciphers and HMACs are used for the actual encryption. (See Lynn, "Authenticated Identity-Based Encryption", available on eprint.
标签: Boneh-Franklin implementation identity-based encryption
上传时间: 2013-12-20
上传用户:yan2267246