-
idea
encryption algorithm, IDEA, symmetric key cryptography algorithm used in internet widly
- 2009-09-04 13:05:40下载
- 积分:1
-
An improved tabu search algorithm to solve knapsack problem. The algorithm is ba...
提出一种改进的禁忌搜索算法来求解背包问题。该算法基于禁忌搜索技术,并采用I&D策略,同时设计了两种针对局
部最优解的变异算子。改进后的算法能有效地弥补标准禁忌算法对初始解依赖的缺陷,同时也避免了搜索停滞的现象。通过对具
体实例和随机问题的测试,表明改进后的禁忌搜索算法有更好的性能。
关-An improved tabu search algorithm to solve knapsack problem. The algorithm is based on tabu search techniques, using I & D strategies, while designed for the local optimal solution of the two kinds of mutation operator. The improved algorithm can effectively compensate for the standard tabu search algorithm depends on the initial solution defect, but also to avoid the phenomenon of search stagnation. Through specific examples and random-question test, indicating that the improved tabu search algorithm has better performance. Guan
- 2022-01-31 13:51:44下载
- 积分:1
-
DAITI
这是个代替密码。实现用代替密码进行加密。(This is instead of a password. Instead of a password is encrypted.)
- 2013-04-14 11:16:03下载
- 积分:1
-
数字电视中的加密
数字电视中的加密-Encryption of digital TV
- 2022-06-20 08:15:12下载
- 积分:1
-
凯撒加密,用java实现的非
凯撒加密,用java实现 非扩展算法,C=M*K,有加密和解密两步-Caesar encryption, using java to achieve non-expansion algorithm, C = M* K, have a two-step encryption and decryption
- 2023-07-05 22:50:02下载
- 积分:1
-
在WTL程序中使用MD5算法的一个实现例子。
在WTL程序中使用MD5算法的一个实现例子。-WTL program in the MD5 algorithm using the example of an implementation.
- 2022-03-22 22:05:53下载
- 积分:1
-
线形移位存储器生成流密码
线形移位存储器生成流密码-linear displacement flow generated password memory
- 2022-03-15 12:21:11下载
- 积分:1
-
et99_softfull
说明: C++的加密狗资料,希望对你们有所帮助.(C++ dongle information you want to help.)
- 2021-04-29 14:28:43下载
- 积分:1
-
DSA数字签名
dsa数字签名
系统功能需求:
1.对文件进行签名,生成一个独立于原文的签名文件;
2.可以对文件进行签名,在文件后追加签名信息;
3.具有密钥管理的功能,比如密钥的生成、导入、导出;
4.可以对word文档实施操作,对word文档的内容进行签名;
5.能够比对已经实施的签名,防止进行重复的签名,以防止重放攻击;
6.可以对已经签名的文件进行单独的源文件和签名信息的分离操作。(DSA digital signature
System functional requirements:
1. Sign the document and generate a signature file independent of the original text.
2. The document can be signed and the signature information can be added after the document.
3. It has the function of key management, such as key generation, import and export.
4. Word documents can be operated and the contents of Word documents can be signed.
5. Ability to compare existing signatures and prevent duplicate signatures to prevent replay attacks;
6. It is possible to separate the source file from the signature information of the signed file.)
- 2021-01-06 21:18:54下载
- 积分:1
-
数字签名加密算法的两座大厦先后倒塌―MD5和SHA
数字签名加密算法的两座大厦先后倒塌―MD5和SHA-1这两种应用最为广泛的数字签名加密算法都被山东大学的王小云教授破解。-encrypted digital signature algorithm has two buildings collapsed- MD5 and SHA-1 that the two most widely used digital signature encryption algorithm has been the Shandong University Professor Bruce Schneier break.
- 2023-02-22 21:40:08下载
- 积分:1