-
对于密码学感兴趣的读者适合,当然要求一定的基础
对于密码学感兴趣的读者适合,当然要求一定的基础-for cryptography for interested readers, of course, requires a certain basis
- 2022-04-15 00:23:27下载
- 积分:1
-
aes_des
AES DES 算法 实现 xcbc cmac ecb cbc ofb cfb pcbc ctr (AES, DES algorithm XCBC cmac ECB CBC ofb CFB PCBC CTR)
- 2015-07-30 09:38:56下载
- 积分:1
-
It s about algorithm for caesar encode
It s about algorithm for caesar encode
- 2022-03-10 12:41:41下载
- 积分:1
-
IDEA Encryption Algorithm Implementation
IDEA加密算法的实现-IDEA Encryption Algorithm Implementation
- 2022-03-23 19:59:48下载
- 积分:1
-
本文介绍了在JAVA开发环境中如何对文件和数据进行有效的加密,特别是里面API的调用...
本文介绍了在JAVA开发环境中如何对文件和数据进行有效的加密,特别是里面API的调用-This paper presents the Java development environment and how to document effective data encryption, in particular inside the API ca
- 2022-06-21 03:14:37下载
- 积分:1
-
jiamijiemi
说明: 这是基于希尔密码基础上的一套matlab实现的加密解密程序(This is based on the Hill password matlab on the basis of a set of procedures to achieve the encryption and decryption)
- 2008-10-05 11:14:42下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1
-
MD5 algorithm. MD5 to 512 groups to deal with the importation of information and...
MD5算法的实现。MD5以512位分组来处理输入的信息,且每一分组又被划分为16个32位子分组,经过了一系列的处理后,算法的输出由四个32位分组组成,将这四个32位分组级联后将生成一个128位散列值。
-MD5 algorithm. MD5 to 512 groups to deal with the importation of information and each group was also divided into 16 groups of 32 seats, After a series of processing, the output from the algorithm 4 32 subgroups, 4 32 this group will generate a cascade 128 hash value.
- 2022-03-22 20:21:27下载
- 积分:1
-
一款文件加密的小软件
一款文件加密的小软件-one small file encryption software
- 2022-08-05 22:24:43下载
- 积分:1
-
SoftCore_LED80-master
说明: 使用VHDL实现的LED-80分组密钥,相对于其它密钥具有硬件实现面积更小的特点(vhd code of a lightweight block cipher LED-80)
- 2020-03-24 20:57:31下载
- 积分:1