-
一解码程序,挺好的东东,不过是用汇编写的,希望能对大家有所帮助。其中还有一个是hcs系列芯片的接收程序。...
一解码程序,挺好的东东,不过是用汇编写的,希望能对大家有所帮助。其中还有一个是hcs系列芯片的接收程序。-a decoding procedure very well, the Eastern, but is the compilation was made in the hope that it can be helpful to everyone. Among them were a series of chips is hcs reception procedures.
- 2023-05-16 20:50:03下载
- 积分:1
-
S-DES编程S-DES加密采用8和10明文作为密钥输入,有8个密文作为输出。使用同一密钥进行加密和解密。要求:CBC模式到解密版本增加。对话界面:在目录选项中选择加密或解密密钥输入明文或密文文档(对于二进制内容,。Txt文件,),建议加密或解密已完成2。输出:产生密文或明文文本3。提供:文档、源代码、可执行文件,通过加密实验得到运行结果。4分析雪崩效应文件:键下同一个显式改变文本在闭合处的差异,在同一个地方显式改变电位器在密文处的情况
- 2022-10-09 22:15:03下载
- 积分:1
-
使用来加减密的,是RSA和MD5的复合使用的源码!
使用来加减密的,是RSA和MD5的复合使用的源码!-Secret used to addition and subtraction, is a composite RSA and MD5 to use source code!
- 2022-08-16 08:44:36下载
- 积分:1
-
DES 加密系统的 C 语言源代码
DES 加密系统的 C 语言源代码-DES encryption system in C language source code
- 2022-01-30 12:34:28下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1
-
笔者长期从事移动通信系统的无线链路调制与解调、物理层实现方面的工作。在移动通信GSM系统中,我们进行语音或者业务信道解调时,都会遇到CRC的求解。通常在硬件DS...
笔者长期从事移动通信系统的无线链路调制与解调、物理层实现方面的工作。在移动通信GSM系统中,我们进行语音或者业务信道解调时,都会遇到CRC的求解。通常在硬件DSP实现时,特别是40位CRC求解时候,由于生成多项式有41项,DSP最大一次能处理40位,所以使用单个寄存器会遇到一些困难,那么以下这个程序将会解决这一困难(这是针对定点DSP、C55xx的编程实现方法)。-The author has long been engaged in mobile communication system modulation and demodulation of wireless links, the physical layer to achieve work. GSM in the mobile communications system, we have a voice or channel demodulation operations, it will encounter the solution of CRC. DSP hardware usually realize, especially when solving the 40 CRC, as the generation polynomial has 41, DSP can handle the largest 40, so using a single register may encounter some difficulties, then following this process will solve this One difficulty (which is for fixed-point DSP, C55xx realize programming methods).
- 2022-06-18 05:18:56下载
- 积分:1
-
sha
sha-1算法是目前常用的数字摘要算法,可以为任意长度的数据生成20字节的数字摘要,是数字签名的基础-sha-1 algorithm is commonly used in digital digest algorithm, for arbitrary length of 20 bytes of data generation digital summary is the basis of digital signatures
- 2022-06-15 00:28:01下载
- 积分:1
-
字符串加密算法
c#程序
String encryption algorithm
字符串加密算法
c#程序
String encryption algorithm-String encryption algorithm c# program String encryption algorithm
- 2022-02-02 07:39:46下载
- 积分:1
-
RSA算法 :首先, 找出三个数, p, q, r, 其中 p, q 是两个相异的质数, r 是与 (p...
RSA算法 :首先, 找出三个数, p, q, r, 其中 p, q 是两个相异的质数, r 是与 (p-1)(q-1) 互质的数...... p, q, r 这三个数便是 person_key,接著, 找出 m, 使得 r^m == 1 mod (p-1)(q-1)..... 这个 m 一定存在, 因为 r 与 (p-1)(q-1) 互质, 用辗转相除法就可以得到了..... 再来, 计算 n = pq....... m, n 这两个数便是 public_key ,编码过程是, 若资料为 a, 将其看成是一个大整数, 假设 a < n.... 如果 a >= n 的话, 就将 a 表成 s 进位 (s
- 2022-02-06 10:37:53下载
- 积分:1
-
Using RCS to do file encryption source code, VC environment. Package consists of...
采用RCS做文件加密的源程序代码,VC环境。包含两个文件包,里面的Readme有详细介绍。-Using RCS to do file encryption source code, VC environment. Package consists of two documents, which detailed the Readme.
- 2022-06-12 14:50:27下载
- 积分:1