-
The source code of IDEA encryption algorithm
idea加密算法源代码-The source code of IDEA encryption algorithm
- 2022-06-11 15:55:08下载
- 积分:1
-
RSA encryption realize, I hope to be helpful to everyone to study the algorithm...
RSA加密实现,希望对大家有所帮助,研究算法是很让人痛苦的事情,大家多多努力-RSA encryption realize, I hope to be helpful to everyone to study the algorithm is a very painful thing, a lot of U.S. efforts
- 2022-03-05 12:25:08下载
- 积分:1
-
md5算法是计算机密码学里经典的算法,实用价值很高,设计的关键在于随机数的产生,本程序采用传统的利用计算机时钟采集种子的办法生成随机数种子。...
md5算法是计算机密码学里经典的算法,实用价值很高,设计的关键在于随机数的产生,本程序采用传统的利用计算机时钟采集种子的办法生成随机数种子。-md5 password algorithm is computer science Lane classic algorithms, highly practical, design is the key to the selection of random numbers, the procedure using the traditional use of computer clock seed collection methods generate random number seed.
- 2022-09-30 05:25:02下载
- 积分:1
-
Inroduce the algorithm of RSA.
Inroduce the algorithm of RSA.
- 2023-03-24 00:15:04下载
- 积分:1
-
一些重要的加密算法的实现
一些重要的加密算法的实现---主要是针对大学密码学课程中的算法实践,例如: 维吉尼亚密码,置换密码,移位密码-Some key encryption algorithm--- mainly aimed at the realization of the University of cryptography algorithms for practical courses, such as: Virginia password, replacement password, password, and so shift
- 2022-11-14 20:50:03下载
- 积分:1
-
DES密码体制的安全性应该不依赖于算法的保密,其安全性仅以加密密钥的保密为基础...
DES密码体制的安全性应该不依赖于算法的保密,其安全性仅以加密密钥的保密为基础-DES password security system should not depend on secrecy algorithm, the only security encryption key based on the confidentiality
- 2022-06-01 12:20:45下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1
-
在Visual C++ 6.0下利用Rijndael算法进行任意文件加密,一个rijndael加密算法的使用实例,虽然图形界面做得比较粗糙,但是程序本身有很多值...
在Visual C++ 6.0下利用Rijndael算法进行任意文件加密,一个rijndael加密算法的使用实例,虽然图形界面做得比较粗糙,但是程序本身有很多值得参考和学习的地方- 6.0 carries on the free document encryption in Visual C using
the Rijndael algorithm, a rijndael encryption algorithm use example,
although the graphical interface does quite roughly, but procedure
itself has the very multiple-valued reference and the study place
- 2022-01-31 21:53:39下载
- 积分:1
-
有关欧几里德的扩展算法,非常实用,经测试好用
有关欧几里德的扩展算法,非常实用,经测试好用- The expansion of the Euclidean algorithm, is very practical, easy to use as test
- 2022-03-12 00:54:37下载
- 积分:1
-
base64码转换程序,不够完善
base64码转换程序,不够完善-base64 code conversion, not perfect
- 2022-06-13 20:14:40下载
- 积分:1