-
CRC coding Verilog code for CRC encoding capabilities to achieve
CRC编码verilog代码,用于实现crc编码功能-CRC coding Verilog code for CRC encoding capabilities to achieve
- 2023-03-24 23:25:11下载
- 积分:1
-
DES算法实现过程分析 之 C
这是jacobi迭代算法-iterative algorithm to caculate Jacobi(matrix?)
- 2022-08-20 17:12:01下载
- 积分:1
-
base64的解码C语言实现
base64的解码C语言实现-base64 decoding C Language
- 2023-07-04 08:50:03下载
- 积分:1
-
简单的RSA加密范例
简单的RSA加密范例-simple example of the RSA encryption
- 2022-08-05 12:37:46下载
- 积分:1
-
RSA加密算法在VB中的实现.可以更好的了解RSA加密算法.
RSA加密算法在VB中的实现.可以更好的了解RSA加密算法.-RSA encryption algorithm in VB realized. To better understand the RSA encryption algorithm.
- 2022-03-11 12:34:40下载
- 积分:1
-
amendment of the original CMd5 CaculateStr function of the type of serious error...
修正了原CMd5类的CaculateStr函数的严重错误,并且转到新的C++类库。此类已经经过验证,文件和字符串均能得到正确结果,支持Unicode(Unicode时不需要转换)-amendment of the original CMd5 CaculateStr function of the type of serious errors and to the new C Class. Such has been validated, documents, and the string to get the correct result, Unicode support (Unicode does not need conversion)
- 2022-01-25 16:30:42下载
- 积分:1
-
DES算法实现过程分析
DES算法实现过程分析-DES algorithm analysis
- 2023-03-24 11:50:03下载
- 积分:1
-
AES加密源代码实例
AES加密源程序示例-AES encryption source code examples
- 2022-01-26 00:29:39下载
- 积分:1
-
des文件加密系统。
des文件加密系统。-des document cryptographic system.
- 2022-02-05 07:31:56下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1