登录
首页 » C++ Builder » ecc

ecc

于 2020-12-21 发布 文件大小:58KB
0 244
下载积分: 1 下载次数: 24

代码说明:

  ecc加密算法,通过c语言实现。希望有帮助(ecc c++)

文件列表:

ok
..\aes.c,10389,2013-11-21
..\aes.h,717,2013-11-21
..\ecc.c,18039,2013-11-21
..\ecc.h,5612,2013-12-07
..\ecc_f2m.c,33094,2013-12-07
..\ecc_fp.c,24003,2013-12-07
..\ecc_test.c,14839,2013-11-21
..\ecc_test.dsp,3759,2013-11-08
..\ecc_test.dsw,522,2013-09-28
..\ecc_test.ncb,115712,2013-12-07
..\ecc_test.opt,54784,2013-12-07
..\ecc_test.plg,1682,2013-12-07
..\Makefile,188,2013-11-14
..\readme.txt,360,2013-12-07
..\zigbee.c,5504,2013-12-07
..\zigbee.h,889,2013-12-07

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • EC-Signature
    基于miracl大数库的椭圆曲线EC的签名算法的c语言实现(Database based on large numbers miracl elliptic curve signature algorithm EC for c-language implementation)
    2020-07-03 18:40:02下载
    积分:1
  • AES-CMAC
    (1). 复习AES原理。 (2). 用C/C++编写AES算法并调试通过。 (3). 复习CMAC原理。 (4). 在实现AES基础上,用C/C++编写CMAC算法并调试通过。 (5). 回答下列思考题。  AES解密算法和AES的逆算法之间有什么不同?  CMAC与HMAC相比,有什么优点? ((1). Review AES works. (2) with C/C++ write and debug via the AES algorithm. (3) review CMAC principle. (4) on the basis of achieving AES using C/C++ CMAC algorithm written and debugged. (5) Answer the following Questions.  What is the difference between AES and AES decryption algorithm inverse algorithm?  CMAC compared with HMAC, what are the advantages?)
    2020-11-20 11:39:36下载
    积分:1
  • AML-Efficient-Approximate-Membership
    AML EFFICIENT APPROXIMATE MEMBERSHIP LOCALIZATION WITHIN A WEB-BASED JOIN FRAMEWORK ABSTRACT: In this paper, we propose a new type of Dictionary-based Entity Recognition Problem, named Approximate Membership Localization (AML). The popular Approximate Membership Extraction (AME) provides a full coverage to the true matched substrings from a given document, but many redundancies cause a low efficiency of the AME process and deteriorate the performance of real-world applications using the extracted substrings. The AML problem targets at locating non overlapped substrings which is a better approximation to the true matched substrings without generating overlapped redundancies. In order to perform AML efficiently, we propose the optimized algorithm P-Prune that prunes a large part of overlapped redundant matched substrings before generating them.
    2013-12-15 16:45:53下载
    积分:1
  • DESmiyue
    这只是标准DES算法的例子,必须在WINDOWS环境下编译.(This is just the standard DES algorithm, which must be compiled in the WINDOWS environment.)
    2009-03-24 19:38:06下载
    积分:1
  • sm2
    说明:  国密算法SM2, 包括 MIRACL库, SM3算法, 用于各种加密通讯(National secret algorithm SM2)
    2020-07-20 20:48:46下载
    积分:1
  • 网络编程编写客户端与服务端的成语词典
    网络编程编写客户端与服务端的成语词典,内含SQL list数据库(Write idiom dictionary of client and server by network programming, including SQL list database)
    2020-06-25 04:20:02下载
    积分:1
  • Encoder
    对称加密(DES加密解密),非对称加密(RSA加密解密)。(Symmetric encryption (DES encryption and decryption), asymmetric encryption (RSA encryption and decryption).)
    2014-08-21 18:36:59下载
    积分:1
  • Hideseek_introduction
    Hideseek可将秘密文件隐写到指定图片中,并可检测隐写信息,本文是对该软件的使用说明。(hide &seek to run the file through individual test run normally. Hidden secret documents can be written to the specified picture, and can detect steganographic message.)
    2013-10-30 11:21:59下载
    积分:1
  • DES
    自己开发的一个des加密算法,可用作网络通信方面,希望对大家有帮助(Their development of a des encryption algorithm can be used as network communications, we want to help)
    2010-06-11 07:37:12下载
    积分:1
  • Rabin算法
    用c++实现Rabin算法的加密和解密,大素数由程序自动生成(Using c++ to realize encryption and decryption of Rabin algorithm, large prime number is automatically generated by program.)
    2020-12-15 23:39:14下载
    积分:1
  • 696516资源总数
  • 106914会员总数
  • 0今日下载