-
Serpent encryption algorithm source code
Serpent加密算法源代码-Serpent encryption algorithm source code
- 2022-03-04 23:13:18下载
- 积分:1
-
关于Diamond算法的一个小程序
关于Diamond算法的一个小程序-Diamond algorithm on a small program
- 2022-08-11 00:11:47下载
- 积分:1
-
rsa加密算法源码
rsa加密算法源码-Source code of RSA encrypt algorithm
- 2022-08-24 04:59:14下载
- 积分:1
-
RSA算法
实施一个小程序,以产生一对非对称密钥对要与RSA算法使用。
- 2022-04-02 07:09:52下载
- 积分:1
-
极好的加密程序,DES的接班人,源码是DEHLPHI的Pascal,编译后可直接运行...
极好的加密程序,DES的接班人,源码是DEHLPHI的Pascal,编译后可直接运行-Excellent encryption, DES s successor, is DEHLPHI source of Pascal, the compiler can be run directly
- 2023-07-04 04:20:02下载
- 积分:1
-
替换C#动态链接库引用
用来替换动态链接库的相互引用关系,去掉强签名请求。
- 2023-07-26 02:15:03下载
- 积分:1
-
tuyecrypt
凸出扫描
- 2023-02-05 17:05:04下载
- 积分:1
-
md5--加密文件
MD5 算法描述 对 MD5 算法简要的叙述可以为:MD5 以 512 位分组来处理输入的信 息,且每一分组又被划分为 16 个 32 位子分组,经过了一系列的处理后, 算法的输出由四个 32 位分组组成, 将这四个 32 位分组级联后将生成一个 128 位散列值。 在 MD5 算法中,首先需要对信息进行填充,使其字节长度对 512 求 余的结果等于 448。因此,信息的字节长度(Bits Length)将被扩展至 N*512+448,即 N*64+56 个字节(Bytes) ,N 为一个正整数。填充的方 法如下,在信息的后面填充一个 1 和无数个 0,直到满足上面的条件时才 停止用 0 对信息的填充。 请点击左侧文件开始预览 !预览只提供20%的代码片段,完整代码需下载后查看 加载中 侵权举报
- 2023-03-04 16:05:03下载
- 积分:1
-
纠错编码算法,使用白
Error Correcting Code algorithms, for use whit E
- 2023-02-08 01:45:04下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1