-
一篇数字水印方面的文章。
一篇数字水印方面的文章。-a digital watermark articles on the subject.
- 2022-03-02 11:14:36下载
- 积分:1
-
an encryption machine used for the registration can add your own procedures you...
一个加密机用来注册用的可以加进你自己的程序里可以试试挺部错的!-an encryption machine used for the registration can add your own procedures you can try Ting Ministry wrong!
- 2022-12-24 17:25:04下载
- 积分:1
-
vc++编写的eky算法源码。 1、 用户确认eKey被锁定(使用“eKey测试”工具测试,显示错误代码为-9,则表示eKey被锁定)。...
vc++编写的eky算法源码。 1、 用户确认eKey被锁定(使用“eKey测试”工具测试,显示错误代码为-9,则表示eKey被锁定)。-vc eky prepared by the algorithm source code. 1, the user mounts lock ( "CPU test" tests show that error code to-9, then the MPC lock).
- 2022-06-19 16:03:43下载
- 积分:1
-
有多种加密算法,如:字节取反、循环异或、码变换法、CSED、D3DES。...
有多种加密算法,如:字节取反、循环异或、码变换法、CSED、D3DES。-There are a variety of encryption algorithms, such as: anti-byte check, recycling XOR, code transformation, CSED, D3DES.
- 2023-07-22 06:25:03下载
- 积分:1
-
对yinxueyuan DES编码的第二版,注释很清晰,和良好的体育…
尹学渊版的DES第二版,注释写得非常清楚,并且执行效率不错,代码质量相比第一版有很大的改进,尹学渊保留所有权利,转载自:http://www.cnblogs.com/erwin/-The second edition of YinXueyuan s DES code,the Notes is very clear, and good performance, code quality compared to a significant improvement over the first edition, All rights reserved.YinXueyuan, reprinted from: http://www.cnblogs.com/ erwin /
- 2022-12-06 12:10:03下载
- 积分:1
-
This is the original RSA algorithm implementation code can be used directly, has...
这是RSA算法的原代码实现应该直接能用,已调试好-This is the original RSA algorithm implementation code can be used directly, has good debugging
- 2022-05-26 09:40:10下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1
-
基于Blowfish加密算法的文件加密源程序
基于Blowfish加密算法的文件加密源程序-Blowfish encryption algorithm based on the source file encryption
- 2022-12-20 09:20:03下载
- 积分:1
-
工商银行 PCSC 智能卡读取程序示例
基于 金邦达Gem USB KEY 的工商银行 PCSC 智能卡读取程序示例。自定义 APDU 命令交互,读取智能卡数据
- 2022-05-19 02:50:13下载
- 积分:1
-
用VC编写的一个简单的文件加密的程序源代码
用VC编写的一个简单的文件加密的程序源代码-VC prepared by a simple document encryption source code
- 2023-08-09 19:20:03下载
- 积分:1