01.
RFC2875 - Diffie-Hellman Proof-of-Possession AlgorithmsNetwork Working Group H. PrafullchandraRequest for Comments: 2875 Critical Path IncCategory: Standards Track J. Schaad July 2000 Diffie-Hellman Proof-of-Possession AlgorithmsStatus of this Memo Th...查看完整版>>
RFC2875 - Diffie-Hellman Proof-of-Possession Algorithms
02.
RFC2631 - Diffie-Hellman Key Agreement MethodNetwork Working Group E. RescorlaRequest for Comments: 2631 RTFM Inc.Category: Standards Track June 1999 Diffie-Hellman Key Agreement MethodStatus of this Memo This document specifies an Internet ...查看完整版>>
RFC2631 - Diffie-Hellman Key Agreement Method
03.
Implementation of Fortune’s AlgorithmsImplementation of Fortune’s AlgorithmsReports on a Course Programming Assignment Computing the Voronoi Diagram Liu Zhenming(cs_lzm) 1. Introduction Voronoi Diagram has a large range of applications;...查看完整版>>
Implementation of Fortune’s Algorithms
04.
JAVA上加密算法的实现用例MD5/SHA1,DSA,DESede/DES,Diffie-Hellman的使用源文作者王辉第1章基础知识 1.1. 单钥密码体制 单钥密码体制是一种传统的加密算法,是指信息的发送方和接收方共同使用同一把密钥进行加解密。 通常,使用的加密算法比较简便高效,密钥简短,加解密速度快,破译极其困难...查看完整版>>
JAVA上加密算法的实现用例MD5/SHA1,DSA,DESede/DES,Diffie-Hellman的使用
05.
MD5/SHA1,DSA,DESede/DES,Diffie-Hellman的使用MD5/SHA1,DSA,DESede/DES,Diffie-Hellman的使用1章基础知识1.1. 单钥密码体制单钥密码体制是一种传统的加密算法,是指信息的发送方和接收方共同使用同一把密钥进行加解密。通常,使用的加密算法比较简便高效,密钥简...查看完整版>>
MD5/SHA1,DSA,DESede/DES,Diffie-Hellman的使用
06.
AntiHookExec Version 1.0 (Anti API Hooking Proof-Of-Concept)by Tan Chew Keong15 April 2004Download API hooking is a useful technique that can be used to monitor API calls used by Win32 programs. This allows understanding of the programs' functionalities based ...查看完整版>>
AntiHookExec Version 1.0 (Anti API Hooking Proof-Of-Concept)
07.
AntiHookExec Version 1.0 (Anti API Hooking Proof-Of-Concept)by Tan Chew Keong15 April 2004 IntroductionAPI hooking is a useful technique that can be used to monitor API calls used by Win32 programs. This allows understanding of the programs' functionalities ba...查看完整版>>
AntiHookExec Version 1.0 (Anti API Hooking Proof-Of-Concept)
08.
Win2K/XP SDT Restore 0.2 (Proof-Of-Concept)by Tan Chew KeongReleased : 06 Jul 2004Updated : 09 Oct 2004 (paper available for download) Presented at HITB 2004 IntroductionWin32 Kernel Rootkits modify the behaviour of the system by Kernel Nativ...查看完整版>>
Win2K/XP SDT Restore 0.2 (Proof-Of-Concept)
09.
RFC2876 - Use of the KEA and SKIPJACK Algorithms in CMSNetwork Working Group J. PawlingRequest for Comments: 2876 WGSI, A Getronics CompanyCategory: Informational July 2000 Use of the KEA and SKIPJACK Algorithms in CMSStatus of this Memo This memo pro...查看完整版>>
RFC2876 - Use of the KEA and SKIPJACK Algorithms in CMS
10.
Tools and algorithms for the construction and analysis of systems(系统构造与分析用工具和算法)|报价¥93.50|图书,进口原版,Computers & Internet 计算机与互联网,Computer Science 计算机科学,目录:图书,进口原版,Computers & Internet 计算机与互联网,Computer Science 计算机科学,品牌:基本信息·出版社:Springer; 1 edition·页码:482 页码·出版日:2002年·ISBN:9783540434191·条码:978354043419...查看完整版>>
Tools and algorithms for the construction and analysis of systems(系统构造与分析用工具和算法)|报价¥93.50|图书,进口原版,Computers & Internet 计算机与互联网,Computer Science 计算机科学,
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。