-
文件中有说明,本程序主要提供了MD5算法的功能实现!
文件中有说明,本程序主要提供了MD5算法的功能实现!-Document has indicate that this procedure provides the main function of MD5 algorithm realize!
- 2022-03-13 13:36:05下载
- 积分:1
-
tms320lf2407例程
tms320lf2407例程-tms320lf2407 routines
- 2022-02-18 15:10:53下载
- 积分:1
-
加密算法源代码应用
加密算法源代码应用-encryption algorithm source code application
- 2022-01-28 11:28:20下载
- 积分:1
-
welfare lottery 3D, projections, the software has shrunk. Is their half
welfare lottery 3D, projections, the software has shrunk. Is their half-year effort, delphi development, it is entirely possible commercialization of the software (value 10,000), Now it dedicated to the PUDN.com
- 2023-04-10 05:05:03下载
- 积分:1
-
一个用各种加密算法给文件加密的Delphi例子。为了减小文件size把执行文件去掉了。D7下编译。...
一个用各种加密算法给文件加密的Delphi例子。为了减小文件size把执行文件去掉了。D7下编译。-A full example that encript a file with many motheds.You should sompile it under D7.
- 2022-02-05 03:48:24下载
- 积分:1
-
C编程WPS获得密码文件
用C编程获取WPS的文件密码-C programming WPS access to the password file
- 2022-04-25 06:03:50下载
- 积分:1
-
right ORCLE database protection, and highly functional, encryption, access, dele...
对ORCLE数据库进行保护,具有很强的功能,有加密,访问,删除,等保护功能-right ORCLE database protection, and highly functional, encryption, access, deletion, such as the protection function
- 2022-10-22 18:15:03下载
- 积分:1
-
数据库安全至关重要,尤其是Access数据库,由于其加密算法过于简单,使得Access单靠密码无法保证其安全,本代码通过改变数据库头文件实现对Acess数据库的...
数据库安全至关重要,尤其是Access数据库,由于其加密算法过于简单,使得Access单靠密码无法保证其安全,本代码通过改变数据库头文件实现对Acess数据库的加密。-Database security is crucial, especially the Access database, because of its too simple encryption algorithm, making Access a password alone can not guarantee their safety, the code by changing the header file database achieve Acess database encryption.
- 2023-07-10 15:15:03下载
- 积分:1
-
CRC码产生器与校验器程序
Features :
Executes in one clock cycle per data word
Any po...
CRC码产生器与校验器程序
Features :
Executes in one clock cycle per data word
Any polynomial from 4 to 32 bits
Any data width from 1 to 256 bits
Any initialization value
Synchronous or asynchronous reset-CRC code generator and calibration program Features: Executes in one clock cycle per data word Any polynomial from 4 to 32 bits Any data width from 1 to 256 bits Any initialization value Synchronous or asynchronous reset
- 2022-04-26 14:28:34下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1