-
这是一个好的程序用MATLAB信号处理。这给你浅…
This a good program to start with signal processing in matlab.This gives you basic idea about covolution algorithm.
- 2023-07-03 10:10:03下载
- 积分:1
-
DES算法在delphi下的实现范例
DES算法在delphi下的实现范例-delphi DES algorithm in the example of achievement
- 2022-07-21 00:51:51下载
- 积分:1
-
128192和256位密钥的密码Twofish的VHDL实现。
VHDL implementation of the twofish cipher for 128,192 and 256 bit keys.
The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.-VHDL implementation of the twofish cipher for 128,192 and 256 bit keys.
The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some
- 2022-07-08 23:33:44下载
- 积分:1
-
AES加密算法的实现
AES encryption algorithm implementation
- 2022-12-03 09:35:02下载
- 积分:1
-
CCITT并行CRC 16
CCITT Parallel CRC 16-bit
- 2022-04-21 00:41:49下载
- 积分:1
-
一款和不错的用VC实现的DES算法,希望对大家对提意见,
一款和不错的用VC实现的DES算法,希望对大家对提意见,-section and a good VC with the DES algorithm, we hope that the right to say,
- 2023-04-25 00:00:03下载
- 积分:1
-
硬盘保护锁,绝对经典,研究硬盘加密的不得不看呀
硬盘保护锁,绝对经典,研究硬盘加密的不得不看呀-Hard drive protection locks, an absolute classic, researchers have looked hard disk encryption
- 2022-06-29 00:50:46下载
- 积分:1
-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1
-
MD5加密算法源代码,个人感觉相当有学习的热的价值,希望大家共同学习,共同进步....
MD5加密算法源代码,个人感觉相当有学习的热的价值,希望大家共同学习,共同进步.-MD5 encryption algorithm source code, personal feeling quite hot the value of learning, I hope everyone learn together and seek common progress.
- 2023-04-17 22:30:03下载
- 积分:1
-
这个是RSA密钥对生成器,使用RSA EURO
这个是RSA密钥对生成器,使用RSA EURO-This is the RSA key pair generator, the use of RSA EURO
- 2022-03-04 13:00:54下载
- 积分:1