-
最快速的可满足性分析工具软件,曾经获得比赛的冠军,能够让学习者,学很多的编程技巧...
最快速的可满足性分析工具软件,曾经获得比赛的冠军,能够让学习者,学很多的编程技巧-The fastest satisfiability analysis tool software, has won the championship, will allow learners, learning a lot of programming skills
- 2022-08-11 13:19:53下载
- 积分:1
-
使用openssl库,公钥对数据进行加密的dll库的源代码
使用openssl库,公钥对数据进行加密的dll库的源代码-Using openssl library, public key data encryption dll library source code
- 2022-03-18 05:44:34下载
- 积分:1
-
RegistTimes RegistDays时间限制控制控件。(有源代码)工作在:D2 D3 D4 D5。作者:Mats Asplund。...
RegistTimes RegistDays时间限制控制控件。(有源代码)工作在:D2 D3 D4 D5。作者:Mats Asplund。-RegistTimes RegistDays controls time limit control. (Source code) in: D2 D3 D4 D5. Author: Mats Asplund.
- 2022-05-26 16:42:39下载
- 积分:1
-
密钥盘生成程序,附使用说明
密钥盘生成程序,附使用说明-Key disk generation process, with the use of
- 2022-07-09 16:35:34下载
- 积分:1
-
Base 64 加解码程序
Base 64 加解码程序-The program of BASE 64 encryption and decryption
- 2022-03-20 16:35:31下载
- 积分:1
-
MIME base64 简单的编解码,主要用于学习之用
MIME base64 简单的编解码,主要用于学习之用-A simple MIME base64 encoding and decoding.
- 2022-05-13 22:33:06下载
- 积分:1
-
DES to achieve fully their own! Able to enter the selected string or the realiza...
DES完全自己实现!能对输入字符串或者选定实现CBC,CFB-1,-8,-64等模式。算法自带有效率检测函数,运行结束显示系统效率。此源代码完全胜任课程设计,就算是毕业设计也只需进行一点改进。欢迎大家下载!-DES to achieve fully their own! Able to enter the selected string or the realization of CBC, CFB-1,-8,-64, such as model. Efficient detection algorithm own function, run the end of display system efficiency. This source code fully qualified for curriculum design, even if it is also just graduated from design to improve a little. Welcome you to download!
- 2022-01-22 15:36:03下载
- 积分:1
-
一个DES加密的实现
一个DES加密的实现-a realization of the DES encryption
- 2022-02-05 23:56:00下载
- 积分:1
-
elgamal加密算法
这是很好的源代码,对于很多的童鞋来说是非常好的资料,而且程序简单易懂。本程序是在VISUAL C++6.0运行,不过在其他版本的软件上应该也可以运行。
- 2022-03-21 02:53:08下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1