-
使用cryptapi加密的demo程序
使用cryptapi加密的demo程序-cryptapi use encryption procedures demo
- 2022-01-25 23:14:22下载
- 积分:1
-
这是一个加密算法,我自己也看不懂,发上来大家看一下
这是一个加密算法,我自己也看不懂,发上来大家看一下-This is an encryption algorithm, I, for one can not read, the U.S. authorities to look at
- 2023-05-01 20:50:03下载
- 积分:1
-
通用de
Universal De-embedding Procedure
- 2022-07-09 01:16:25下载
- 积分:1
-
MD5加密算法得VisualC++6.0源程序,直接调用里面的函数即可
MD5加密算法得VisualC++6.0源程序,直接调用里面的函数即可-MD5 Encryption Algorithm in Visual C++ 6.0 source code, direct calls to the function can be
- 2022-10-27 15:05:04下载
- 积分:1
-
solaris 10 dvd md5 文档 说明
solaris 10 dvd md5 文档 说明-solaris 10 dvd md5 documentation
- 2022-01-21 17:46:41下载
- 积分:1
-
DES
标准des加密程序,在dev-cpp编译器下成功编译运行,实现数据加密解密(standard des encryption program using c++)
- 2013-12-01 13:57:07下载
- 积分:1
-
AES IP core
While there are many AES cores around, this one is designed with LUT6 based FPGA architecture in mind from day one.
The AES Decryption Core for FPGA implements the decryption portion of the AES (a.k.a. Rijndael) algorithm described in the FIPS-197 specification. Key lengths of 128 / 192 / 256 bits are supported, each with a separate instantiation wrapper. Since the core is designed to take advantage of LUT6 based FPGA archit
- 2022-02-06 04:58:15下载
- 积分:1
-
spear and shield the contest (2)
矛与盾之争(二)——CRC原则部分
- 2022-01-28 18:36:55下载
- 积分:1
-
沙
SHA-1Hash函数源码,可以对任何文件做Hash,得到的Hash值为160位。具有抗强碰撞,弱碰撞等能力。虽然王小云已经找到了个别碰撞。但在新的好的hash函数出来之前仍将被广泛使用。-SHA-1Hash function source, any document can be done right hash, the hash value of 160. Anti-collision, the weak capabilities of the collision. Although Bruce Schneier, had found individual collisions. But the new good hash function will be out before widespread use.
- 2023-06-21 07:50:03下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1