-
一个加密的算法。
一个加密的算法。-An encryption algorithm.
- 2022-03-13 16:18:49下载
- 积分:1
-
这是RC5算法的ASM实现,效率很高,可以直接用到工程中去
这是RC5算法的ASM实现,效率很高,可以直接用到工程中去-This is the RC5 algorithm ASM realization of very efficient and can be used directly on projects to
- 2022-02-25 07:12:49下载
- 积分:1
-
ECC的C++源码,非常简单而且容易理解
ECC的C++源码,非常简单而且容易理解-ECC
- 2022-05-18 09:02:16下载
- 积分:1
-
我用C#做的一个对字符串加密的程序,加密对象为26个字母大小写和0到9的数字,实现的是替代法...
我用C#做的一个对字符串加密的程序,加密对象为26个字母大小写和0到9的数字,实现的是替代法-I used C# do a strings encryption procedures, encryption targeted at 26 case-sensitive alphanumeric 0-9 and figures to achieve the substitution
- 2022-01-25 18:38:23下载
- 积分:1
-
RSA实现数字签名算法 VC++实现,有图形化窗口
RSA实现数字签名算法 VC++实现,有图形化窗口-Digital Signature Algorithm to RSA
- 2023-06-12 09:30:05下载
- 积分:1
-
CRC
CRC-16算法的C语言实现(以常见的CRC-ITU为例引出的比特型算法)。-CRC-16 algorithm of the C language (in common CRC-ITU as an example of bit-based algorithm for extraction).
- 2022-06-17 00:22:20下载
- 积分:1
-
含有rc2、rc4、rc5、rc6算法的rc算法集合
含有rc2、rc4、rc5、rc6算法的rc算法集合- Includes rc2, rc4, rc5, rc6 the algorithm rc algorithm gathers
- 2022-02-06 05:29:31下载
- 积分:1
-
程序使用C++展示相当强的XOR加密。
当它unencrypting文件时,包括EOF验错和自动侦查。程序很好被提供并且做在串类建立的好用法。...
程序使用C++展示相当强的XOR加密。
当它unencrypting文件时,包括EOF验错和自动侦查。程序很好被提供并且做在串类建立的好用法。-Program Uses C++ to Demonstrate A Fairly Strong XOR Encryption.
Includes EOF error checking and automatic detection of when it is unencrypting a file.
Program Is Documented Well And Also Makes Good Use of the Built In String Class.
- 2022-12-20 10:10:03下载
- 积分:1
-
大整数运算的实现
大整数运算的实现-large integer arithmetic Implementation
- 2022-05-07 09:02:08下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1