-
c描述的lzw算法,完整的可以在tc下运行!
c描述的lzw算法,完整的可以在tc下运行!-c described lzw algorithm, the integrity of the tc can run!
- 2022-04-27 18:57:10下载
- 积分:1
-
dos environment sequence drives the use of encryption procedures
dos环境下的利用硬盘序列号加密的程序-dos environment sequence drives the use of encryption procedures
- 2022-02-15 19:34:51下载
- 积分:1
-
椭圆曲线密码体制的实现。该项目没有开发C++编译器的任何问题…
ECC Implmentation . The programme works without any problem on compiler Dev C++ available at bloodshed.
- 2023-05-12 12:15:04下载
- 积分:1
-
关于mpc85XX sec驱动 sec版本为2.0.支持多种加密算法
关于mpc85XX sec驱动 sec版本为2.0.支持多种加密算法-Mpc85XX sec on the sec-driven version 2.0. To support a variety of encryption algorithms
- 2023-06-25 00:15:03下载
- 积分:1
-
implementation of MD5 can download source
可以执行的MD5源程序下载-implementation of MD5 can download source
- 2022-03-30 20:01:34下载
- 积分:1
-
128 bit AES Pipelined Cipher
The Advanced Encryption Standard (AES) specifies a FIPS- approved cryptographic algorithm that can be used to protect electronic data.
The AES-128 pipelined cipher module uses AES algorithm which is a symmetric block cipher to encrypt (encipher) information.
This module is optimized for speed as it pipeline hardware to perform repeated sequence called round
- 2022-01-25 21:48:15下载
- 积分:1
-
替换C#动态链接库引用
用来替换动态链接库的相互引用关系,去掉强签名请求。
- 2023-07-26 02:15:03下载
- 积分:1
-
Skipjack 加密算法 美国国家安全局标准加密算法
Skipjack 加密算法 美国国家安全局标准加密算法-Skipjack encryption algorithm US country peaceful overall
situation standard encryption algorithm
- 2022-01-26 02:18:26下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1
-
防篡改问题论文,,一个应用程序使用可视密码方案
我的项目主题是防止篡改问题纸使用视觉密码。
防篡改问题纸 (新) 提供了一个非常安全的方法来隐藏文件在不同股票的问题。在此应用中,试卷的题目分解成 n 件,单独地产量没有关于试卷的题目的信息。问题,这些纸片被称为股票或阴影,然后可能分布在一组 n 参与者/经销商。通过结合任何 k 问题纸可以恢复这些股票,但结合小于 k 的他们不会透露任何信息关于问题的论文。在此方法中, 重建的问题本文基于 XOR 运算。这将启用一个回获得完
- 2022-05-30 15:31:34下载
- 积分:1