-
硬盘保护锁,绝对经典,研究硬盘加密的不得不看呀
硬盘保护锁,绝对经典,研究硬盘加密的不得不看呀-Hard drive protection locks, an absolute classic, researchers have looked hard disk encryption
- 2022-06-29 00:50:46下载
- 积分:1
-
Ecc 160bit
ECC(Elliptic Curves Cryptography)加密算法是一种公钥加密算法,与主流的RSA算法相比,ECC算法可以使用较短的密钥达到相同的安全程度。此文档是160bit的C++源代码.
- 2022-02-04 22:09:49下载
- 积分:1
-
高级加密标准AES优胜算法Rijndael c语言源代码。
高级加密标准AES优胜算法Rijndael c语言源代码。-Advanced Encryption Standard algorithm Rijndael winning c language source code.
- 2022-03-26 03:03:41下载
- 积分:1
-
RSA
RSA-1.02VERSION
- 2023-09-05 10:05:03下载
- 积分:1
-
替换C#动态链接库引用
用来替换动态链接库的相互引用关系,去掉强签名请求。
- 2023-07-26 02:15:03下载
- 积分:1
-
对yinxueyuan DES编码的第二版,注释很清晰,和良好的体育…
尹学渊版的DES第二版,注释写得非常清楚,并且执行效率不错,代码质量相比第一版有很大的改进,尹学渊保留所有权利,转载自:http://www.cnblogs.com/erwin/-The second edition of YinXueyuan s DES code,the Notes is very clear, and good performance, code quality compared to a significant improvement over the first edition, All rights reserved.YinXueyuan, reprinted from: http://www.cnblogs.com/ erwin /
- 2022-12-06 12:10:03下载
- 积分:1
-
do encryption components from other places to download overnight.
一个C#做的加密组件,从别的地方下载过来的。-do encryption components from other places to download overnight.
- 2022-09-29 04:45:03下载
- 积分:1
-
个人编的rsa的源代码,算出public―private key;其中有Euclid,Extend Euclid的实现,以及Millar...
个人编的rsa的源代码,算出public―private key;其中有Euclid,Extend Euclid的实现,以及Millar-Rabin test的实现,和加密/解密-Rsa personal series of source code, calculate the public-private key including Euclid, Extend Euclid realization, as well as the Millar-Rabin test realization, and the encryption/decryption
- 2022-02-15 01:43:51下载
- 积分:1
-
s
s
- 2022-03-05 02:08:57下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1