-
Base64 加密算法(Author 蒋柏良 Jerry Jiang)
Base64 加密算法(Author 蒋柏良 Jerry Jiang)-*
* DESCRIPTION
* Base64 processes input in 24bit chunks by converting each chunk into 4
* bytes of output. It does so by splitting input into four 6bit groups and
* using these as indexes in the following substitution table-
* const char base64_map[] =
* "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
* "abcdefghijklmnopqrstuvwxyz"
* "0123456789+/"
* If an input is not a multiple of 3 bytes, it s padded with zeros. In
* this case the output bytes that consist entirely of the pad data are
* replaced with = .
*
* Example
* An input of 0x00 0x45 0xF2 is equivalent to 00000000 01000101 11110010
* bit sequence, which s then split into 000000 000100 010111 110010
* and these are substituted to produce the following base64 encoding
* A E X y
*
* RETURN VALUE
* b64_length() should return output length for the input of len bytes.
* b64_encode() should encode len bytes from src int
- 2022-07-18 16:55:26下载
- 积分:1
-
openssl编程入门(包括一个完整的样本),是一种安全程序等。
openssl编程入门(含完整示例),是一本openssl安全编程的一本入门书,相当不错、!-openssl programming entry (including a complete sample), is a security program openssl an entry book, quite good!
- 2022-06-11 19:04:48下载
- 积分:1
-
MD5加密算法源代码,对于初学者有很好的借鉴意义!
MD5加密算法源代码,对于初学者有很好的借鉴意义!-MD5 encryption algorithm source code, there are very good for the beginners learn the meaning of!
- 2023-08-15 20:40:03下载
- 积分:1
-
双随相位加密系统的加密程序,调试好的,没有错误
双随相位加密系统的加密程序,调试好的,没有错误-4f
- 2022-05-16 02:28:50下载
- 积分:1
-
An easy language tutorial encryption ....................
一个易语言的加密教程-An easy language tutorial encryption ....................
- 2022-02-06 10:18:21下载
- 积分:1
-
solaris 10 dvd md5 文档 说明
solaris 10 dvd md5 文档 说明-solaris 10 dvd md5 documentation
- 2022-01-21 17:46:41下载
- 积分:1
-
MAC算法SHA―1算法的C语言实现源码
MAC算法SHA―1算法的C语言实现源码-SHA-1 algorithm for the C language source
- 2023-01-13 22:20:03下载
- 积分:1
-
大数运算库miracl。有了miracl这样的函数库,你可以直接调用函数,来实现你要的公钥密码学的某个功能。...
大数运算库miracl。有了miracl这样的函数库,你可以直接调用函数,来实现你要的公钥密码学的某个功能。-Treasury computing large numbers miracl. With miracl this library, you can directly call the function, to realize that you ask for a public-key cryptography functions.
- 2023-03-22 00:40:03下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1
-
yoda s Crypter 1.2 程序及源码 yoda PE加密保护,Win32ASM源码。
yoda s Crypter 1.2 程序及源码 yoda PE加密保护,Win32ASM源码。 -Yoda s Crypter 1.2 procedures and source Yoda PE encryption protection, Win32ASM source.
- 2022-01-24 13:53:25下载
- 积分:1