-
产生随机加密字符串,可用于产品的标识及权限控制等功能的实现上...
产生随机加密字符串,可用于产品的标识及权限控制等功能的实现上-randomly generated string encryption can be used for product identification and access control functions in the realization
- 2022-01-27 10:19:16下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1
-
密码学文献有一个奇妙的发展历程,当然,密而不宣总是扮演主要角色。第一次世界大战前,重要的密码学进展很少出现在公开文献中,但该领域却和其它专业学科一样向前发展。...
密码学文献有一个奇妙的发展历程,当然,密而不宣总是扮演主要角色。第一次世界大战前,重要的密码学进展很少出现在公开文献中,但该领域却和其它专业学科一样向前发展。-cryptography literature has a wonderful history, of course, close does not declare always played the leading role. Before the First World War, it was important to cryptography little progress emerged in the open literature. However, the area has other professional disciplines and the development of the same.
- 2022-03-30 19:34:10下载
- 积分:1
-
BASE64编码的实现
BASE64编码的实现-BASE64 encoded realize
- 2022-03-21 22:34:01下载
- 积分:1
-
B样条曲线生成程序.txt B样条曲线生成程序.txt
B样条曲线生成程序.txt B样条曲线生成程序.txt-B-spline curve generation procedure. TxtB spline curve generation procedure. TxtB spline curve generation procedure. Txt
- 2022-07-03 23:04:32下载
- 积分:1
-
这是一个加密程序,可对字符串进行加密,字符串和密钥的内容和长度可以设置。...
这是一个加密程序,可对字符串进行加密,字符串和密钥的内容和长度可以设置。-This is an encryption program that encrypt the string, string and key content and length can be set.
- 2022-03-07 20:55:55下载
- 积分:1
-
一个完全使用java编写的加密通用算法包,含des,des3,rsa等很多加密算法源码...
一个完全使用java编写的加密通用算法包,含des,des3,rsa等很多加密算法源码- Completely uses the java compilation the encryption general
algorithm package, contains des, des3, rsa and so on very many
encryptions calculates the law origin code
- 2022-05-20 18:13:01下载
- 积分:1
-
password procedures designed fake password
密码学程序设计---仿设密码-password procedures designed fake password---
- 2023-01-12 09:25:04下载
- 积分:1
-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1
-
Designing of Bit serial type Galois Field GF(2m) Multiplier
- 2023-04-19 09:45:03下载
- 积分:1