-
encrypt image
加密数字图像的主要源码 加密数字图像的主要源码-encrypt image
- 2023-04-06 13:20:04下载
- 积分:1
-
MISTY 加密算法 二进制兼容的加密算法,加密匙可到128位
MISTY 加密算法 二进制兼容的加密算法,加密匙可到128位-MISTY binary compatible encryption algorithm encryption algorithms, encryption keys can be 128
- 2022-03-26 13:35:10下载
- 积分:1
-
这是个好东西,可以代替系统的记事本。
这是个好东西,可以代替系统的记事本。-This a good thing, the system can replace the notebook.
- 2022-03-03 23:41:30下载
- 积分:1
-
A MD5 Source Code which can be run after translation and edition. It contains ma...
一个可以实际编译运行的 MD5算法原代码,含main调试程序。-A MD5 Source Code which can be run after translation and edition. It contains main debug program.
- 2022-03-24 17:03:23下载
- 积分:1
-
LINUX下使用Ansi C编写的MD5消息散列算法
LINUX下使用Ansi C编写的MD5消息散列算法-LINUX use Ansi C prepared news MD5 hash algorithm
- 2023-08-26 05:15:03下载
- 积分:1
-
山排序算法:基本思想:全序无序分离…
希尔排序算法:
基本思想:将整个无序序列分割成若干小的子序列分别进行插入排序。 序列分割方法:将相隔某个增量h的元素构成一个子序列。在排序过程中,逐次减小这个增量,最后当h减到1时,进行一次插入排序,排序就完成。增量序列一般采用:ht=2t-1,1≤t≤[log2n],其中n为待排序序列的长度。-Hill sorting algorithm: the basic idea: the whole sequence disorder is separated into a number of small sub-sequences respectively Insertion Sort. Sequence segmentation method: h will be separated by an incremental elements constitute a subset of sequences. In the sort process, the successive decrease of the increment, and finally reduced to one when h when an insertion sort, sort completed. Incremental sequence generally use: ht = 2t-1, 1 ≤ t ≤ [log2n], in which n is the length of sequence to be sorted.
- 2022-02-06 21:23:34下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1
-
此程序为3栏栅加密算法程序,可对一段明文字符加密 作者:万艳良 单位:武汉理工大学...
此程序为3栏栅加密算法程序,可对一段明文字符加密 作者:万艳良 单位:武汉理工大学-this procedure for three fencing encryption algorithm procedures, the section expressly characters encryption Author : 10000-Yan units : Wuhan Polytechnic University
- 2022-08-12 12:11:34下载
- 积分:1
-
椭圆曲线Elliptic Curve)加密算法(
椭圆曲线Elliptic Curve)加密算法(-Elliptic Curve Elliptic Curve) encryption algorithm (
- 2023-04-18 23:25:03下载
- 积分:1
-
MD5生成器,可以生成字符串或文件的MD5值
MD5生成器,可以生成字符串或文件的MD5值-MD5 Generator can generate the MD5 string or document the value of
- 2022-04-13 06:52:13下载
- 积分:1