-
sspi_workbench
sspi_workbench
- 2022-07-19 06:43:43下载
- 积分:1
-
JPEG2000 image format for the use of the Arnold transform the image of the wavel...
针对JPEG2000格式的图像,利用了Arnold变换对图像的小波系数进行加密,对初步研究JPEG2000图像加密算法的有试用价值-JPEG2000 image format for the use of the Arnold transform the image of the wavelet coefficients encryption, preliminary study of the JPEG2000 image encryption algorithms have tested the value of
- 2022-03-02 04:18:08下载
- 积分:1
-
COBRA cipher algorithm example.
COBRA cipher algorithm example.
- 2022-03-06 21:09:35下载
- 积分:1
-
MD5 algorithm. MD5 to 512 groups to deal with the importation of information and...
MD5算法的实现。MD5以512位分组来处理输入的信息,且每一分组又被划分为16个32位子分组,经过了一系列的处理后,算法的输出由四个32位分组组成,将这四个32位分组级联后将生成一个128位散列值。
-MD5 algorithm. MD5 to 512 groups to deal with the importation of information and each group was also divided into 16 groups of 32 seats, After a series of processing, the output from the algorithm 4 32 subgroups, 4 32 this group will generate a cascade 128 hash value.
- 2022-03-22 20:21:27下载
- 积分:1
-
AES IP core
While there are many AES cores around, this one is designed with LUT6 based FPGA architecture in mind from day one.
The AES Decryption Core for FPGA implements the decryption portion of the AES (a.k.a. Rijndael) algorithm described in the FIPS-197 specification. Key lengths of 128 / 192 / 256 bits are supported, each with a separate instantiation wrapper. Since the core is designed to take advantage of LUT6 based FPGA archit
- 2022-02-06 04:58:15下载
- 积分:1
-
using CAST
采用CAST-256位加密的Back Orifice 2000插件源代码-using CAST-256 encryption Back Orifice 2000 plug-in source code
- 2023-04-17 18:10:03下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1
-
RCA加密算法的实现
RCA encryption algorithm implementation
- 2022-01-28 15:32:10下载
- 积分:1
-
sdffsadfasfsadfasdfasdfasdfsadfxc
dfasdfjaslkdfjlska jflkasf
sadflaksdjflkasdj...
解放勒克司的可是酱豆腐了喀什觉得立刻电视机分厘卡技术副教授打开浪费拉扩大撒飞机昆仑山搭街坊-sdffsadfasfsadfasdfasdfasdfsadfxc
dfasdfjaslkdfjlska jflkasf
sadflaksdjflkasdjfs
fasjdflkas
- 2022-06-14 10:56:18下载
- 积分:1
-
md5通用加密算法,采用C编写,也可以在C++下使用
md5通用加密算法,采用C编写,也可以在C++下使用-General md5 encryption algorithm, using C to prepare, you can also use C++
- 2022-01-24 13:44:33下载
- 积分:1