-
这是一个古典加密算法。是最近自己编写的。
这是一个古典加密算法。是最近自己编写的。-This is a classical encryption algorithm. Recently prepared themselves.
- 2023-04-14 22:10:03下载
- 积分:1
-
密码学文献有一个奇妙的发展历程,当然,密而不宣总是扮演主要角色。第一次世界大战前,重要的密码学进展很少出现在公开文献中,但该领域却和其它专业学科一样向前发展。...
密码学文献有一个奇妙的发展历程,当然,密而不宣总是扮演主要角色。第一次世界大战前,重要的密码学进展很少出现在公开文献中,但该领域却和其它专业学科一样向前发展。-cryptography literature has a wonderful history, of course, close does not declare always played the leading role. Before the First World War, it was important to cryptography little progress emerged in the open literature. However, the area has other professional disciplines and the development of the same.
- 2022-03-30 19:34:10下载
- 积分:1
-
IBE identity
IBE基于身份的加密系统的身份提取程序,使用VC6.0开发,即把身份转换成椭圆曲线上的点-IBE identity-based encryption system of the identity of extraction procedures, using VC6.0 development, namely, the identity into a point on the elliptic curve
- 2023-02-17 10:35:04下载
- 积分:1
-
Third
第三代移动系统中以Kasumi为内核的另一加密算法-f8算法的VC++实现-Third-generation mobile system to Kasumi for kernel-f8 encryption algorithm to another algorithm VC++ Realize
- 2022-01-27 20:14:13下载
- 积分:1
-
加密API的使用例子,你可以从例子中学习
Crypto api 使用实例,可以学习的例子-Crypto api to use examples, you can learn from examples
- 2022-06-16 00:50:42下载
- 积分:1
-
It s about algorithm for caesar encode
It s about algorithm for caesar encode
- 2022-03-10 12:41:41下载
- 积分:1
-
On Java encryption technology and the integration of Windows
论Java加密技术与Windows的结合-On Java encryption technology and the integration of Windows
- 2022-01-26 14:17:56下载
- 积分:1
-
aadddddddddddddddddd
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDdddddddddddddddddddddddddddddddddddddddddddddd
- 2022-07-21 16:50:27下载
- 积分:1
-
加密、安全、压缩处理,实例,有爱好者可以学习
加密、安全、压缩处理,实例,有爱好者可以学习-Encryption, security, compression treatment, examples have lovers can learn
- 2022-03-20 04:05:48下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1