登录
首页 » Unix_Linux » draft-richon-vfdp-protocol-00.txt

draft-richon-vfdp-protocol-00.txt

于 2009-10-01 发布 文件大小:20KB
0 182
下载积分: 1 下载次数: 5

代码说明:

  Versatile File Delivery Protocol, a Nack-based reliable multicast file transfer Protocol Instantiation

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 对于码学感兴趣的读者适合,当然要求一定的基础
    对于密码学感兴趣的读者适合,当然要求一定的基础-for cryptography for interested readers, of course, requires a certain basis
    2022-04-15 00:23:27下载
    积分:1
  • aes_des
    AES DES 算法 实现 xcbc cmac ecb cbc ofb cfb pcbc ctr (AES, DES algorithm XCBC cmac ECB CBC ofb CFB PCBC CTR)
    2015-07-30 09:38:56下载
    积分:1
  • It s about algorithm for caesar encode
    It s about algorithm for caesar encode
    2022-03-10 12:41:41下载
    积分:1
  • IDEA Encryption Algorithm Implementation
    IDEA加密算法的实现-IDEA Encryption Algorithm Implementation
    2022-03-23 19:59:48下载
    积分:1
  • 本文介绍了在JAVA开发环境中如何对文件和数据进行有效的,特别是里面API的调用...
    本文介绍了在JAVA开发环境中如何对文件和数据进行有效的加密,特别是里面API的调用-This paper presents the Java development environment and how to document effective data encryption, in particular inside the API ca
    2022-06-21 03:14:37下载
    积分:1
  • jiamijiemi
    说明:  这是基于希尔密码基础上的一套matlab实现的加密解密程序(This is based on the Hill password matlab on the basis of a set of procedures to achieve the encryption and decryption)
    2008-10-05 11:14:42下载
    积分:1
  • ieee一种基于混沌的新方法An Image Encryption Scheme Based on Chaotic Map...
    ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security
    2022-05-30 11:41:05下载
    积分:1
  • MD5 algorithm. MD5 to 512 groups to deal with the importation of information and...
    MD5算法的实现。MD5以512位分组来处理输入的信息,且每一分组又被划分为16个32位子分组,经过了一系列的处理后,算法的输出由四个32位分组组成,将这四个32位分组级联后将生成一个128位散列值。 -MD5 algorithm. MD5 to 512 groups to deal with the importation of information and each group was also divided into 16 groups of 32 seats, After a series of processing, the output from the algorithm 4 32 subgroups, 4 32 this group will generate a cascade 128 hash value.
    2022-03-22 20:21:27下载
    积分:1
  • 一款文件的小软件
    一款文件加密的小软件-one small file encryption software
    2022-08-05 22:24:43下载
    积分:1
  • SoftCore_LED80-master
    说明:  使用VHDL实现的LED-80分组密钥,相对于其它密钥具有硬件实现面积更小的特点(vhd code of a lightweight block cipher LED-80)
    2020-03-24 20:57:31下载
    积分:1
  • 696516资源总数
  • 106658会员总数
  • 16今日下载