-
2的16次幂正整数d与n,编写计算d
2的16次幂正整数d与n,编写计算d-1 (mod n) 的程序;
2、对于三个不超过2的16次幂正整数a、e与n,编写计算ae (mod n) 的程序。
在上述程序基础上写出下列程序:
(1) 对给定的10000以内数判定其是否为素数;
(2) 进行ElGamal体制的加密与签名。
-two of 16 power-positive integer d and n, calculate the preparation of d-1 (mod n); 2. For not more than 2 3 16 Powers positive integers a, e and n, calculate the preparation ae (mod n) procedures. In the above procedure to write on the basis of the following procedures : (a) the right to 10,000 within a few judging whether a prime number; (2) ElGamal encryption and signature.
- 2022-02-14 21:21:03下载
- 积分:1
-
一个伪随机数生成程序,简单实用,有需要的请下载
一个伪随机数生成程序,简单实用,有需要的请下载-A pseudo-random number generator, if necessary, please download the
- 2022-01-31 23:45:21下载
- 积分:1
-
c++的MD5类,简单好用,只需要包含进去,就能方便使用
c++的MD5类,简单好用,只需要包含进去,就能方便使用-c++ the MD5 class, easy-to-use, only need to include, we can facilitate the use of
- 2023-01-04 03:35:04下载
- 积分:1
-
delphi编写的加壳程序,实现对文件保护
delphi编写的加壳程序,实现对文件保护-delphi write the packers program to realize File Protection
- 2022-08-23 18:21:54下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1
-
3DES加密算法~~~~~~~
密码学课程设计
3DES加密算法~~~~~~~
密码学课程设计-3DES encryption algorithm ~~~~~~~ Cryptography Course Design
- 2022-08-11 01:52:05下载
- 积分:1
-
x264编码一个可执行程序的x264.exe,因为我只修改X264算法…
一个x264编码的可执行程序 x264.exe,因为我只修改了 x264 的算法,未加入任何汇编,也没有修改x264的接口和功能,所以原版 x264 能运行的平台,此程序也应当能运行,且功能及调用方式不变。
执行命令方式为:
-o 输出文件 输入文件 宽x高 -B 目标码率-X264 encoding an executable program x264.exe, because I only modified x264 algorithms, not to join any compilation, there is no modification of the interface and functionality of x264, the x264 can run the original platform, this procedure should also be able to run, and function and calls the same way. For the implementation of the order:-o output file input file width x high-B target rate
- 2022-05-21 01:18:22下载
- 积分:1
-
using Twofish 128 blocks of data (128 bits lock) EliteConnect (TM) Universal
Twofish 采用128位数据块(128 bits lock),128-192-256-bit 可变长度密钥。-using Twofish 128 blocks of data (128 bits lock) EliteConnect (TM) Universal-192-256-bit variable-length keys.
- 2022-08-06 06:33:30下载
- 积分:1
-
这个是基于混沌的AES加密算法
这个是基于混沌的AES加密算法-Chaos AES encryption algorithm
- 2022-02-06 03:51:44下载
- 积分:1
-
Playfair源代码是很简单的,随着网络的现有的版本是不同的…
playfair的源代码,很简洁,跟网上现存的版本有所差异,但是效果是很不错的。-playfair source code is very simple, with the existing version of the web is different, but the effect is very good.
- 2022-10-22 16:05:03下载
- 积分:1