-
RSA,MD5的Visual C++源代码v1.2
RSA MD5 VISUAL C++ SOURCE CODE v1.2 - Visual C++ implementation of the RSA MD5 message digest algorithm. Calculates a 32byte checksum for any data sequence. Developed by Langfine Ltd. Note, RSA copyright notices must be adhered to - see the source code for details.Released November 2001-RSA MD5 VISUAL C++ SOURCE CODE v1.2- Visual C++ implementation of the RSA MD5 message digest algorithm. Calculates a 32byte checksum for any data sequence. Developed by Langfine Ltd. Note, RSA copyright notices must be adhered to- see the source code for details.Released November 2001
- 2022-01-27 11:45:11下载
- 积分:1
-
可以让你软件加密起来哈
可以让你软件加密起来哈-can let you up encryption software Kazakhstan
- 2022-05-30 20:20:32下载
- 积分:1
-
--- -----md5--- --- ---属于200种加密算法的一种------------ md5--------------- encryption algorithm 200 is a
- 2022-06-01 17:35:26下载
- 积分:1
-
A MD5 Source Code which can be run after translation and edition. It contains ma...
一个可以实际编译运行的 MD5算法原代码,含main调试程序。-A MD5 Source Code which can be run after translation and edition. It contains main debug program.
- 2022-03-24 17:03:23下载
- 积分:1
-
解zip(V1.1)文件密码的程序源码
解zip(V1.1)文件密码的程序源码- Solves zip (V1.1) the document password procedure source code
- 2023-01-25 12:50:03下载
- 积分:1
-
这个DES由Verilog
this DES made by verilog
- 2022-12-11 13:10:03下载
- 积分:1
-
PE程序加密壳源程序
PE程序加密壳源程序 -PE procedure encryption shell source program
- 2022-08-13 03:42:19下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1
-
Universal Asynchronous Receiver
Universal Asynchronous Receiver
- 2022-11-30 02:20:03下载
- 积分:1
-
一个简单的ECC实现源代码,用C++编写,还包含文字说明
一个简单的ECC实现源代码,用C++编写,还包含文字说明-ECC realize a simple source code, using C++ Prepared, also contains text descriptions
- 2022-04-15 01:56:10下载
- 积分:1