-
加密图代码
这是我的密码学算法 Algorithm. 我已经习惯了的哈希算法该算法。这种算法不是反向或解密,而且不可能。
- 2023-04-23 06:55:02下载
- 积分:1
-
JAVA generic class treatment (BASE64)
JAVA通用类处理(BASE64)-JAVA generic class treatment (BASE64)
- 2022-03-22 21:52:18下载
- 积分:1
-
为一个字节或字符数组或串计算md5值,内部只创建一个数组,节省分配时间,节省内存 完全是static方法,线程安全 注意对返回值的处理,见注释
为一个字节或字符数组或串计算md5值,内部只创建一个数组,节省分配时间,节省内存 完全是static方法,线程安全 注意对返回值的处理,见注释-for a byte array or character string or md5 value calculation, only to create an internal array, saving time allocated to save memory is completely static method, thread-safe attention to the return value, see note
- 2022-01-28 07:19:00下载
- 积分:1
-
S盒的线性逼近表的运算,可在程序里面修改数值,这是一本密码学的书籍上的题目的运算程序...
S盒的线性逼近表的运算,可在程序里面修改数值,这是一本密码学的书籍上的题目的运算程序-S-box linear approximation table calculations, which can be modified numerical procedure, which is a cryptography book on the topic of computing procedures
- 2023-04-06 21:30:04下载
- 积分:1
-
Skipjack 加密算法 美国国家安全局标准加密算法
Skipjack 加密算法 美国国家安全局标准加密算法-Skipjack encryption algorithm US country peaceful overall
situation standard encryption algorithm
- 2022-01-26 02:18:26下载
- 积分:1
-
source for the realization of PKCS# 12 standard
PKCS#12源程序,用于实现PKCS#12标准-source for the realization of PKCS# 12 standard
- 2022-01-25 14:38:26下载
- 积分:1
-
RC4算法的Asm实现,实现效率高,可以很方便的用到工程中去
RC4算法的Asm实现,实现效率高,可以很方便的用到工程中去-Asm achieve RC4 algorithm to achieve high efficiency
- 2023-01-31 12:10:03下载
- 积分:1
-
des
des-bish,不错,自己写的-des-bish, yes, their writing
- 2022-07-24 19:24:13下载
- 积分:1
-
基于RSA的数字签名实现,用VC++模拟实现RSA数字签名过程。
基于RSA的数字签名实现,用VC++模拟实现RSA数字签名过程。-RSA-based digital signature implementation, using VC++ simulation of the process of realization of RSA digital signature.
- 2022-01-31 22:15:48下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1