登录
首页 » 加密解密 » 对yinxueyuan DES编码的第二版,注释很清晰,和良好的体育…

对yinxueyuan DES编码的第二版,注释很清晰,和良好的体育…

于 2022-12-06 发布 文件大小:14.96 kB
0 133
下载积分: 2 下载次数: 1

代码说明:

尹学渊版的DES第二版,注释写得非常清楚,并且执行效率不错,代码质量相比第一版有很大的改进,尹学渊保留所有权利,转载自:http://www.cnblogs.com/erwin/-The second edition of YinXueyuan s DES code,the Notes is very clear, and good performance, code quality compared to a significant improvement over the first edition, All rights reserved.YinXueyuan, reprinted from: http://www.cnblogs.com/ erwin /

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 码程序,挺好的东东,不过是用汇编写的,希望能对大家有所帮助。其中还有一个是hcs系列芯片的接收程序。...
    一解码程序,挺好的东东,不过是用汇编写的,希望能对大家有所帮助。其中还有一个是hcs系列芯片的接收程序。-a decoding procedure very well, the Eastern, but is the compilation was made in the hope that it can be helpful to everyone. Among them were a series of chips is hcs reception procedures.
    2023-05-16 20:50:03下载
    积分:1
  • S-DES编程S-DES加密采用8和10明文作为密钥输入,有8个密文作为输出。使用同一密钥进行加密和解密。要求:CBC模式到解密版本增加。对话界面:在目录选项中选择加密或解密密钥输入明文或密文文档(对于二进制内容,。Txt文件,),建议加密或解密已完成2。输出:产生密文或明文文本3。提供:文档、源代码、可执行文件,通过加密实验得到运行结果。4分析雪崩效应文件:键下同一个显式改变文本在闭合处的差异,在同一个地方显式改变电位器在密文处的情况
    2022-10-09 22:15:03下载
    积分:1
  • 使用来的,是RSA和MD5的复合使用的源码!
    使用来加减密的,是RSA和MD5的复合使用的源码!-Secret used to addition and subtraction, is a composite RSA and MD5 to use source code!
    2022-08-16 08:44:36下载
    积分:1
  • DES 系统的 C 语言源代码
    DES 加密系统的 C 语言源代码-DES encryption system in C language source code
    2022-01-30 12:34:28下载
    积分:1
  • ieee一种基于混沌的新方法An Image Encryption Scheme Based on Chaotic Map...
    ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security
    2022-05-30 11:41:05下载
    积分:1
  • 笔者长期从事移动通信系统的无线链路调制与调、物理层实现方面的工作。在移动通信GSM系统中,我们进行语音或者业务信道调时,都会遇到CRC的求。通常在硬件DS...
    笔者长期从事移动通信系统的无线链路调制与解调、物理层实现方面的工作。在移动通信GSM系统中,我们进行语音或者业务信道解调时,都会遇到CRC的求解。通常在硬件DSP实现时,特别是40位CRC求解时候,由于生成多项式有41项,DSP最大一次能处理40位,所以使用单个寄存器会遇到一些困难,那么以下这个程序将会解决这一困难(这是针对定点DSP、C55xx的编程实现方法)。-The author has long been engaged in mobile communication system modulation and demodulation of wireless links, the physical layer to achieve work. GSM in the mobile communications system, we have a voice or channel demodulation operations, it will encounter the solution of CRC. DSP hardware usually realize, especially when solving the 40 CRC, as the generation polynomial has 41, DSP can handle the largest 40, so using a single register may encounter some difficulties, then following this process will solve this One difficulty (which is for fixed-point DSP, C55xx realize programming methods).
    2022-06-18 05:18:56下载
    积分:1
  • sha
    sha-1算法是目前常用的数字摘要算法,可以为任意长度的数据生成20字节的数字摘要,是数字签名的基础-sha-1 algorithm is commonly used in digital digest algorithm, for arbitrary length of 20 bytes of data generation digital summary is the basis of digital signatures
    2022-06-15 00:28:01下载
    积分:1
  • 字符串算法 c#程序 String encryption algorithm
    字符串加密算法 c#程序 String encryption algorithm-String encryption algorithm c# program String encryption algorithm
    2022-02-02 07:39:46下载
    积分:1
  • RSA算法 :首先, 找出三个数, p, q, r, 其中 p, q 是两个相异的质数, r 是与 (p...
    RSA算法 :首先, 找出三个数, p, q, r, 其中 p, q 是两个相异的质数, r 是与 (p-1)(q-1) 互质的数...... p, q, r 这三个数便是 person_key,接著, 找出 m, 使得 r^m == 1 mod (p-1)(q-1)..... 这个 m 一定存在, 因为 r 与 (p-1)(q-1) 互质, 用辗转相除法就可以得到了..... 再来, 计算 n = pq....... m, n 这两个数便是 public_key ,编码过程是, 若资料为 a, 将其看成是一个大整数, 假设 a < n.... 如果 a >= n 的话, 就将 a 表成 s 进位 (s
    2022-02-06 10:37:53下载
    积分:1
  • Using RCS to do file encryption source code, VC environment. Package consists of...
    采用RCS做文件加密的源程序代码,VC环境。包含两个文件包,里面的Readme有详细介绍。-Using RCS to do file encryption source code, VC environment. Package consists of two documents, which detailed the Readme.
    2022-06-12 14:50:27下载
    积分:1
  • 696518资源总数
  • 105885会员总数
  • 31今日下载