登录
首页 » 加密解密 » use an iterative equation Xn Asin2 = (Xn

use an iterative equation Xn Asin2 = (Xn

于 2022-02-03 发布 文件大小:81.92 kB
0 149
下载积分: 2 下载次数: 1

代码说明:

使用迭代方程Xn+1=Asin2(Xn-XB)生成混沌序列{Xi},需输入A和Xb值,不同的值产生不同的加密效果,但是仅在混沌区内的加密效果最好。在Microsoft Visual Studio .NET 2003上调试成功,用C++语言编写-use an iterative equation Xn Asin2 = (Xn- XB) generated chaotic sequence (Xi) need input A and isolate value, different values in different encryption effect, but only in the chaotic region of encryption is the best. In Microsoft Visual Studio.NET 2003 Debugger success C Language

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • MD5算法研究 最新的,具体内容看文章 Message
    MD5算法研究 最新的,具体内容看文章 Message-Digest Algorithm 5它的英文名字-MD5 algorithm studies newly, the concrete content looks at article Message-Digest the Algorithm 5 its English names
    2022-02-07 02:43:25下载
    积分:1
  • SM2.SM3.SM4代码及资料
    非常详细的SM2、SM3、SM4算法说明及c语言代码,国密局公开算法。
    2023-02-09 04:25:04下载
    积分:1
  • 一个伪随机数生成程序,简单实用,有需要的请下载
    一个伪随机数生成程序,简单实用,有需要的请下载-A pseudo-random number generator, if necessary, please download the
    2022-01-31 23:45:21下载
    积分:1
  • Are C functions in detail.
    详细介绍了C函数。
    2022-02-04 23:44:42下载
    积分:1
  • Md5碰撞
    Md5碰撞-Md5 collision
    2022-01-21 18:34:14下载
    积分:1
  • 此小程序为N栏栅算法程序的一种,对输入的明文进行N栏栅,此时必须确定N...
    此小程序为N栏栅加密算法程序的一种,对输入的明文进行N栏栅加密,此时必须确定N-N fencing encryption algorithm a procedure to import expressly for the N fencing encryption, now must determine N
    2023-07-09 20:50:06下载
    积分:1
  • 生成大素数并检验以及生成RSA1024位公钥子程序,不使用库文件,源代码公开,清晰有注释...
    生成大素数并检验以及生成RSA1024位公钥子程序,不使用库文件,源代码公开,清晰有注释-Generate large prime numbers and testing, and to generate RSA1024-bit public key subroutine, do not use library files, source code is open, clear and annotated
    2022-08-07 10:56:08下载
    积分:1
  • 代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
    2023-06-18 10:00:03下载
    积分:1
  • 信息隐藏软件JSteg在VC环境下的源代码
    原本为Linux下的版本,现已修改至可在VS2008下编译。共有两个工程,CJpeg(隐藏)和DJpeg(提取)。E:JStegcjpeg 的目录2014/04/09  16:13              .2014/04/09  16:13              ..2014/03/19  12:39             3,905 bitsourc.c1997/06/01  20:44               131 bitsourc.h2014/04/02  11:03           863,232 cjpeg.ncb2014/03/12  12:39               875 cjpeg.sln2014/03/19  11:47             5,503 cjpeg.vcproj1992/08/07  19:02          &nb
    2022-04-24 10:41:25下载
    积分:1
  • MD5单元及DEMO
    MD5加密单元及DEMO-MD5 encryption modules and DEMO
    2023-06-06 08:25:03下载
    积分:1
  • 696518资源总数
  • 105877会员总数
  • 14今日下载