下载 >  开发技术 >  Java > Java Cryptography and code

Java Cryptography and code

是一本不错Java Cryptography书,有代码
2009-06-12 上传大小:1.47MB
分享
收藏 举报
The Laws of Cryptography wiht Java Code

The Laws of Cryptography wiht Java Code,

立即下载
Cryptography in C and C++, Second Edition (With Source Code)

密码学算法的C、C++语言实现,不错的一本书,喜欢请购买正版。 This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second edition includes about 100 pages of new material as well as numerous improvements to the original text. The chapter about random number generation has been completely rewritten, and the latest cryptographic techniques are covered in detail. Furthermore, this book covers the recent improvements in primality testing.

立即下载
Applied Cryptography - Protocols, Algorithms, and Source Code in C.pdf

Applied Cryptography - Protocols, Algorithms, and Source Code in C

立即下载
Java Cryptography Extension(jce) 源码

jce的源码,很难的啊!里面有各种安全算法(rsa,md5,des,aes...)还有各种证书api(x.509,pkcs系列...),最近在搞网络安全,所搜集一些资料,希望对大家有帮助!

立即下载
Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files

Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files 包含版本6、7、8的权限文件

立即下载
Beginning Cryptography With Java 带源码

Beginning Cryptography with Java While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME. What you will learn from this book How to understand and use JCE, JCA, and the JSSE for encryption and authentication The ways in which padding mechanisms work in ciphers and how to spot and fix typical errors An understanding of how authentication mechanisms are implemented in Java and why they are used Methods for describing cryptographic objects with ASN.1 How to create certificate revocation lists and use the Online Certificate Status Protocol (OCSP) Real-world Web solutions using Bouncy Castle APIs Who this book is for This book is for Java developers who want to use cryptography in their applications or to understand how cryptography is being used in Java applications. Knowledge of the Java language is necessary, but you need not be familiar with any of the APIs discussed. Wrox Beginning guides are crafted to make learning programming languages and technologies easier than you think, providing a structured, tutorial format that will guide you through all the techniques involved.

立即下载
Beginning Cryptography with Java电子书附源代码

Beginning Cryptography with Java电子书并附上源代码 一本关于java安全技术开发的电子书

立即下载
The Laws of Cryptography with Java Code.pdf

The Laws of Cryptography with Java Code.pdfThe Laws of Cryptography with Java Code.pdfThe Laws of Cryptography with Java Code.pdf

立即下载
Java Cryptography Extension (JCE) 无限强度权限策略文件 8

Java Cryptography Extension (JCE) 无限强度权限策略文件 8 下载 Java Cryptography Extension 让应用能够使用更强大的标准算法。

立即下载
Bouncy Castle 1.56 API

Bouncy Castle Cryptography Library(简称BC库)是一个开源且强大的加解密解决方案,适用于JAVA开发ANDROID开发。

立即下载
cryptography-1.5.2.tar.gz

cryptography-1.5.2.tar.gz,scrapy必备

立即下载
Cryptography and Network Security(5th) 无水印pdf

Cryptography and Network Security(5th) 英文无水印pdf 第5版 pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除

立即下载
Introduction to Modern Cryptography 2nd

Introduction to Modern Cryptography 第二版 英文原版 代书签 高清PDF

立即下载
Cryptography network security 7th [PDF]

cryptography network security 7th.pdf cryptography network security 7th.pdf cryptography network security 7th.pdf cryptography network security 7th.pdf cryptography network security 7th.pdf cryptography network security 7th.pdf

立即下载
cryptography network security 7th pdf

加密解密巨著,最新版本,第七版 基础加密算法和网络安全

立即下载
Introduction to Modern Cryptography 2ed -- by Jonathan Katz and Yehuda Lindell

Introduction to Modern Cryptography 2ed -- by Jonathan Katz and Yehuda Lindell 第二版 清晰 非扫描版 需要的下载吧

立即下载
An introduction to mathematical cryptography

Review From the reviews: "The book is devoted to public key cryptography, whose principal goal is to allow two or more people to exchange confidential information … . The material is very well organized, and it is self-contained: no prerequisites in higher mathematics are needed. In fact, everything is explained and carefully covered … . there is abundance of examples and proposed exercises at the end of each chapter. … This book is ideal as a textbook for a course aimed at undergraduate mathematics or computer science students." (Fabio Mainardi, The Mathematical Association of America, October, 2008) "This book focuses on public key cryptography … . Hoffstein, Pipher, and Silverman … provide a thorough treatment of the topics while keeping the material accessible. … The book uses examples throughout the text to illustrate the theorems, and provides a large number of exercises … . The volume includes a nice bibliography. … Summing Up: Highly recommended. Upper-division undergraduate through professional collections." (C. Bauer, Choice, Vol. 46 (7), March, 2009) "For most undergraduate students in mathematics or computer science (CS), mathematical cryptography is a challenging subject. … it is written in a way that makes you want to keep reading. … The authors officially targeted the book for advanced undergraduate or beginning graduate students. I believe that this audience is appropriate. … it could even be used with students who are just learning how to execute rigorous mathematical proofs. … I strongly believe that it finds the right tone for today’s students … ." (Burkhard Englert, ACM Computing Reviews, March, 2009) "The exercises and text would make an excellent course for undergraduate independent study. … This is an excellent book. Hoffstein, Pipher and Silverman have written as good a book as is possible to explain public key cryptography. … This book would probably be best suited for a graduate course that focused on public key cryptography, for undergraduate independent study, or for the mathematician who wants to see how mathematics is used in public key cryptography." (Jintai Ding and Chris Christensen, Mathematical Reviews, Issue 2009 m) Product Description An Introduction to Mathematical Cryptography provides an introduction to public key cryptography and underlying mathematics that is required for the subject. Each of the eight chapters expands on a specific area of mathematical cryptography and provides an extensive list of exercises. It is a suitable text for advanced students in pure and applied mathematics and computer science, or the book may be used as a self-study. This book also provides a self-contained treatment of mathematical cryptography for the reader with limited mathematical background. From the Back Cover This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include: * classical cryptographic constructions, such as Diffie-Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures; * fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms; * an in-depth treatment of important recent cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem. This book is an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online. About the Author Dr. Jeffrey Hoffstein has been a professor at Brown University since 1989 and has been a visiting professor and tenured professor at several other universities since 1978. His research areas are number theory, automorphic forms, and cryptography. He has authored more than 50 publications. Dr. Jill Pipher has been a professor at Brown Univesity since 1989. She has been an invited lecturer and has received numerous awards and honors. Her research areas are harmonic analysis, elliptic PDE, and cryptography. She has authored over 40 publications. Dr. Joseph Silverman has been a professor at Brown University 1988. He served as the Chair of the Brown Mathematics department from 2001–2004. He has received numerous fellowships, grants and awards and is a frequently invited lecturer. His research areas are number theory, arithmetic geometry, elliptic curves, dynamical systems and cryptography. He has authored more than120 publications and has had more than 20 doctoral students.

立即下载
Java Cryptography

Java Cryptography

立即下载
PBC (Pairing-Based Cryptography) library code

PBC (Pairing-Based Cryptography) library 是计算双线性对的所有代码。

立即下载
密码学与网络安全(Cryptography and Network Security -- Behrouz A Forouzan ) 英文版全

对应大学计算机教育国外著名教材系列,密码学与网络安全(中文导读英文版),清华大学出版社

立即下载
关闭
img

spring mvc+mybatis+mysql+maven+bootstrap 整合实现增删查改简单实例.zip

资源所需积分/C币 当前拥有积分 当前拥有C币
5 0 0
点击完成任务获取下载码
输入下载码
为了良好体验,不建议使用迅雷下载
img

Java Cryptography and code

会员到期时间: 剩余下载个数: 剩余C币: 剩余积分:0
为了良好体验,不建议使用迅雷下载
VIP下载
您今日下载次数已达上限(为了良好下载体验及使用,每位用户24小时之内最多可下载20个资源)

积分不足!

资源所需积分/C币 当前拥有积分
您可以选择
开通VIP
4000万
程序员的必选
600万
绿色安全资源
现在开通
立省522元
或者
购买C币兑换积分 C币抽奖
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 4 45
为了良好体验,不建议使用迅雷下载
确认下载
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 0 0
为了良好体验,不建议使用迅雷下载
VIP和C币套餐优惠
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 4 45
您的积分不足,将扣除 10 C币
为了良好体验,不建议使用迅雷下载
确认下载
下载
您还未下载过该资源
无法举报自己的资源

兑换成功

你当前的下载分为234开始下载资源
你还不是VIP会员
开通VIP会员权限,免积分下载
立即开通

你下载资源过于频繁,请输入验证码

您因违反CSDN下载频道规则而被锁定帐户,如有疑问,请联络:webmaster@csdn.net!

举报

若举报审核通过,可返还被扣除的积分

  • 举报人:
  • 被举报人:
  • *类型:
    • *投诉人姓名:
    • *投诉人联系方式:
    • *版权证明:
  • *详细原因: