登录
首页 » Pascal » transpositioncipher

transpositioncipher

于 2006-03-24 发布 文件大小:8KB
0 172
下载积分: 1 下载次数: 0

代码说明:

说明:  天那,大家都来看看小弟的作品都是好东东,算发难,但是程序简单(days, we have to look at the younger brother's works are good Dongdong, counting launched an attack, but simple)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 计算HASH值的C语言源代码,包括7种算法。
    计算HASH值的C语言源代码,包括7种算法。-Calculated HASH value of C language source code, including seven kinds of algorithm.
    2022-11-01 02:25:03下载
    积分:1
  • Rijndael_ECB
    AES加解密C语言源代码,可直接运行通过,方便大家借鉴学习(AES encryption and decryption of C language source code, can be directly run by, we facilitate learning from)
    2013-12-01 14:14:35下载
    积分:1
  • delphi组件
    delphi加密组件-delphi encryption components
    2022-03-24 01:44:51下载
    积分:1
  • 标准C++书写的BlowFish算法,和文件演示,速度较快
    标准C++书写的BlowFish加密算法,和加密文件演示,速度较快-written in standard C BlowFish encryption algorithm, and encryption paper presentations, faster
    2022-03-07 10:15:31下载
    积分:1
  • ieee一种基于混沌的新方法An Image Encryption Scheme Based on Chaotic Map...
    ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security
    2022-05-30 11:41:05下载
    积分:1
  • lorentz
    文字图像,通过混沌加密,利用洛伦兹变换,即三维空间加密程序(Text images, through encryption, using the Lorentz transformation, ie three-dimensional encryption program)
    2010-05-21 01:05:08下载
    积分:1
  • Openssl的常用头文件,本人经常用,很不错的。
    Openssl的常用头文件,本人经常用,很不错的。-The daily head file of Openssl, I often use, it is very good.
    2022-02-12 01:51:31下载
    积分:1
  • et框架由于拥有CLR提供的丰富库支持,只需很少的代码即可实现先前使用C等旧式语言很难实现的算法。本类实现一些常用机算法,供参考。其中MD5算法返回Int...
    et框架由于拥有CLR提供的丰富库支持,只需很少的代码即可实现先前使用C等旧式语言很难实现的加密算法。本类实现一些常用机密算法,供参考。其中MD5算法返回Int的ToString字串。返回数字字母型结果的算法参见之前Blog文章-* This program is free software you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation either version 2, or (at your option) any * later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program if not, write to the Free Software Foundation, * Inc., 59 Temple Place- Suite 330, Boston, MA 02111-1307, USA.
    2022-05-19 19:13:03下载
    积分:1
  • Recursive-subroutine
    该程序使用C++写的一个基于递归子程序算法的语法翻译器,是在vs2012环境下编写的,供大家参考和学习(The program uses C++ to write an algorithm based on recursive subroutine syntax interpreter is written in vs2012 environment, for your reference and learning)
    2013-11-26 23:12:15下载
    积分:1
  • 大数计算在公钥中起到了重要的作用,如何操作大数呢,该程序也许能帮你决这个问题有所帮助。...
    大数计算在公钥加密中起到了重要的作用,如何操作大数呢,该程序也许能帮你解决这个问题有所帮助。-calculated in the end, the public key encryption plays an important role in the operation of large numbers do, the program may be able to help you resolve this problem some help.
    2023-08-04 22:25:02下载
    积分:1
  • 696518资源总数
  • 105908会员总数
  • 30今日下载