-
文件中有说明,本程序主要提供了MD5算法的功能实现!
文件中有说明,本程序主要提供了MD5算法的功能实现!-Document has indicate that this procedure provides the main function of MD5 algorithm realize!
- 2022-03-13 13:36:05下载
- 积分:1
-
FEC2/3加解码
FEC2/3加解码-FEC2/3 plus decoder
- 2022-03-08 08:45:33下载
- 积分:1
-
AES加密源代码实例
AES加密源程序示例-AES encryption source code examples
- 2022-01-26 00:29:39下载
- 积分:1
-
Vigenere 体制 本程序使用dev c++开发实现,希望对大家有用.
Vigenere 体制 本程序使用dev c++开发实现,希望对大家有用.-Vigenere institutional procedures for the use of the dev c achieve development, we hope that the right useful.
- 2022-01-25 16:17:20下载
- 积分:1
-
DES encryption algorithm some explanations
DES 加密算法的一些说明-DES encryption algorithm some explanations
- 2022-07-06 13:16:42下载
- 积分:1
-
s
s
- 2022-03-05 02:08:57下载
- 积分:1
-
SS7消息的格式和代码是ITU 2
ITU SS7 AIF message format and codes part 2
- 2022-03-10 14:44:58下载
- 积分:1
-
a generation of news summary of the procedures can be used to verify the source...
一个java语言下的生成消息摘要的程序,可用于验证来源和确定身份-a generation of news summary of the procedures can be used to verify the source and identification
- 2022-08-10 12:54:40下载
- 积分:1
-
VIP account is provide a way to those who do not want upload code to download
VIP account is provide a way to those who do not want upload code to download
- 2022-11-24 04:55:03下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1