-
简单的密码的例子,使用VB的源码, 非常简单明了,希望大家喜欢。...
简单的密码的例子,使用VB的源码, 非常简单明了,希望大家喜欢。-Simple Example of VB Source Code for Encrypt, Rudimentary encryption/decryption demo program
- 2022-03-16 22:25:01下载
- 积分:1
-
sha密码检验的示例 希望对大家有 帮助
sha密码检验的示例 希望对大家有 帮助-sha password test examples we hope to help
- 2023-07-25 10:45:03下载
- 积分:1
-
是我设计的在DSB中隐藏语音的例子.
用ELANIX公司的SYSTEMVIEW打开运行.
其掩护信号和隐藏信号输入输出端均需设置语音源文件,比如自己录制...
是我设计的在DSB中隐藏语音的例子.
用ELANIX公司的SYSTEMVIEW打开运行.
其掩护信号和隐藏信号输入输出端均需设置语音源文件,比如自己录制的声音.-I designed the DSB concealed voice example. ELANIX company with the SYSTEMVI EW open operation. their cover and concealment signal input and output signals required to set up voice source, For example, recording their voices.
- 2022-07-24 12:24:23下载
- 积分:1
-
KEELOQ_ENcode 简单的加密程序,可惜就是没有源代码。
KEELOQ_ENcode 简单的加密程序,可惜就是没有源代码。-KEELOQ_ENcode simple encryption program, but is not the source code.
- 2023-07-13 18:30:03下载
- 积分:1
-
bloppy blowfish cryptography decrypts your data into jpeg files
bloppy blowfish cryptography decrypts your data into jpeg files
- 2022-01-26 04:41:50下载
- 积分:1
-
用VC++实现数字图象迭代混沌加密方法
用VC++实现数字图象迭代混沌加密方法-with VC digital image iterative method Chaotic Encryption
- 2023-06-02 22:55:02下载
- 积分:1
-
Third
第三代移动系统中以Kasumi为内核的另一加密算法-f8算法的VC++实现-Third-generation mobile system to Kasumi for kernel-f8 encryption algorithm to another algorithm VC++ Realize
- 2022-01-27 20:14:13下载
- 积分:1
-
des演示算法c++实现
des演示算法c++实现-des algorithm demonstration
implemented by C++
- 2023-05-16 17:05:03下载
- 积分:1
-
6)jm.tar.gz是上述程序的程序包,解包后产生一个安装程序install...
6)jm.tar.gz是上述程序的程序包,解包后产生一个安装程序install-jm,运行 ./install-jm就能根据需求选择安装 退出安装程序,安装程序会被自行删除。 8) 以上各程序在RedHatLINUX7.2平台编译通过。 10)本程序仅供学习使用。-6) jm.tar.gz above is the procedure for packages, unpacks resulting from the installation of a procedure install-jm, run./Install- jm demand can choose to exit the setup program to install, the installer will be replaced. 8) The above procedure RedHatLINUX7.2 platform compile. 10) only to learn the procedures used.
- 2022-12-20 09:30:04下载
- 积分:1
-
128192和256位密钥的密码Twofish的VHDL实现。
VHDL implementation of the twofish cipher for 128,192 and 256 bit keys.
The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.-VHDL implementation of the twofish cipher for 128,192 and 256 bit keys.
The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some
- 2022-07-08 23:33:44下载
- 积分:1