-
sha256_demo
SHA256源代码,经过性能优化,含有测试用例(SHA256 source code, through the performance optimization, containing test cases)
- 2021-04-27 21:38:44下载
- 积分:1
-
使用C编写的DES, DESX, DES3(三层DES) 的加密算法, 本程序演示如何在Delphi中进行调用C编写的算法 DES 密匙长度 8 DESX 密匙...
使用C编写的DES, DESX, DES3(三层DES) 的加密算法, 本程序演示如何在Delphi中进行调用C编写的算法 DES 密匙长度 8 DESX 密匙长度 16 DES3 密匙长度 24 (加密强度高了很多)-C prepared by the use of DES, DESX, DES3 (three-DES) encryption algorithm, the program demonstrates how to call in Delphi in the preparation of the algorithm C key length DES key 8 DESX length 16 DES3 key length 24 (high strength encryption a lot)
- 2022-11-09 19:00:03下载
- 积分:1
-
DES
标准des加密程序,在dev-cpp编译器下成功编译运行,实现数据加密解密(standard des encryption program using c++)
- 2013-12-01 13:57:07下载
- 积分:1
-
DES算法及其VC源代码,详细图解,代码完整
DES算法及其VC源代码,详细图解,代码完整-VC DES algorithm and its source code, detailed diagrams, code integrity
- 2023-08-24 18:35:03下载
- 积分:1
-
enigma.zip(VB),一个德国的恩尼格玛密码加密技术很酷的例子,原来的…
enigma.zip(VB)一个德国的enigma加密技术例子COOL,原程序不支持明文是汉字,添加了一个小模块
-enigma.zip (VB), a German enigma encryption technology COOL example, the original program is not expressly support Chinese characters, add a small module
- 2022-08-21 18:13:42下载
- 积分:1
-
Chaos_password
基于混沌,实现对图像的动态加密解密,基于混沌,实现对图像的动态加密解密,基于混沌,实现对图像的动态加密解密,基于混沌,实现对图像的动态加密解密.(Chaos password programe.Chaos password programe.Chaos password programe.Chaos password programe.Chaos password programe.Chaos password programe.)
- 2009-05-24 23:32:46下载
- 积分:1
-
DNA编码解码程序
说明: DNA编码、DNA解码、取补、相关性分析程序是实现基于DNA编码的图像加密算法的核心程序(Encryption Algorithm for dna coding)
- 2021-02-24 18:39:39下载
- 积分:1
-
enumcsp
EnumCSP - Enumerates Crypto Service Providers
Copyright (c) 2000-2004 G.Chapillon
All Rights Reserved.
Contributor:
Jupiter -EnumCSP- Enumerates Crypto Service Providers Copyright (c) 2000-2004 G. Chapillon
- 2022-04-08 01:32:04下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1
-
AES has been certified by the AES DELPHI, the better, we all give it a try and f...
已经通过AES认证的AES的DELPHI实现,比较好,大家自己试试看,搜的-AES has been certified by the AES DELPHI, the better, we all give it a try and found the
- 2022-03-19 00:08:16下载
- 积分:1