登录
首页 » matlab » matlab_desdecode

matlab_desdecode

于 2008-03-19 发布 文件大小:5KB
0 72
下载积分: 1 下载次数: 80

代码说明:

  关于matlab的des源代码,希望能有用,没有乱码(Des on the matlab source code, hoping to be useful, there is no garbled)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • CRC校验程序
    CRC校验程序,使用了CRC-16和CRC-CCITT方法 (CRC inspection program, which use crc-16 and crc-ccitt method)
    2020-06-26 12:20:02下载
    积分:1
  • des
    用JAVA语言实现DES算法。通过文件读取进行加密,密码由客户自行输入(JAVA language used DES algorithm. Read through the document is encrypted, the password input by the customer on its own)
    2009-07-01 11:20:44下载
    积分:1
  • DES算法介绍 
    DES算法介绍 -DES algorithm introduced
    2022-06-17 17:24:26下载
    积分:1
  • rsa
    RSA加密/解密算法实现源码与例子 (The source code and examples of implement of RAS encryption and decryption algorithm )
    2020-06-26 13:00:01下载
    积分:1
  • Caesar
    caser encryption and decryption using matlab
    2013-01-29 15:50:35下载
    积分:1
  • AML-Efficient-Approximate-Membership
    AML EFFICIENT APPROXIMATE MEMBERSHIP LOCALIZATION WITHIN A WEB-BASED JOIN FRAMEWORK ABSTRACT: In this paper, we propose a new type of Dictionary-based Entity Recognition Problem, named Approximate Membership Localization (AML). The popular Approximate Membership Extraction (AME) provides a full coverage to the true matched substrings from a given document, but many redundancies cause a low efficiency of the AME process and deteriorate the performance of real-world applications using the extracted substrings. The AML problem targets at locating non overlapped substrings which is a better approximation to the true matched substrings without generating overlapped redundancies. In order to perform AML efficiently, we propose the optimized algorithm P-Prune that prunes a large part of overlapped redundant matched substrings before generating them.
    2013-12-15 16:45:53下载
    积分:1
  • Elliptic curve public key cryptography algorithms can be used for encryption and...
    椭圆曲线公钥密码算法,可用于加密和数字签名等应用,该版本算法是有限域GF(2^n)上的算法-Elliptic curve public key cryptography algorithms can be used for encryption and digital signature applications, the version of the algorithm is a finite field GF (2 ^ n) the algorithm
    2022-08-04 04:40:22下载
    积分:1
  • wuxianwangluo
    说明:  该文档无线网络密码破解,希望对大家有所帮助(The document password cracking wireless networks, we hope to help)
    2011-03-23 11:30:40下载
    积分:1
  • DES algorithm
    1、掌握典型的分组密码算法(如DES、AES、IDEA、SERPENT等)加、解密原理; 2、能够编写程序实现算法的加、解密。(1. Master the encryption and decryption principles of typical block cipher algorithms (such as DES, AES, IDEA, SERPENT, etc.). 2. Encryption and decryption of algorithm can be realized by programming.)
    2018-12-27 20:33:43下载
    积分:1
  • Flexnet-Trusted-Storage-based_PR_TS_V11.9.1
    FlexNet Publisher 11.9.1 Trusted Storage-based Licensing Programming Reference
    2012-01-07 18:45:44下载
    积分:1
  • 696518资源总数
  • 104287会员总数
  • 49今日下载