-
一个Java例子,包括加密、ftp
一个Java例子,包括加密、ftp-A Java examples, including encryption, ftp
- 2022-07-14 08:40:05下载
- 积分:1
-
base64加密
base64åŠ å¯† -base64 encrypted base64 encryption
- 2022-04-13 07:06:16下载
- 积分:1
-
非常简单却实用的一款通讯簿,主要特色是支持密码保护功能,可以实现联系人信息的保密....
非常简单却实用的一款通讯簿,主要特色是支持密码保护功能,可以实现联系人信息的保密.-very simple but practical one Address Book, the main feature is support password protection function, Contact information can achieve confidentiality.
- 2022-03-16 05:14:19下载
- 积分:1
-
椭圆曲线密码体制的实现。该项目没有开发C++编译器的任何问题…
ECC Implmentation . The programme works without any problem on compiler Dev C++ available at bloodshed.
- 2023-05-12 12:15:04下载
- 积分:1
-
这是MD5算法的 Asm 实现,代码效率高,
这是MD5算法的 Asm 实现,代码效率高,-This is the MD5 algorithm Asm implementation, code efficiency,
- 2022-02-02 04:43:01下载
- 积分:1
-
rsa实验,刚学会的
rsa实验,刚学会的-rsa experiments, the newly acquired
- 2022-02-01 18:31:21下载
- 积分:1
-
用C语言编写的RSA加密算法,利用大素数分解的原理进行加密的一种算法。...
用C语言编写的RSA加密算法,利用大素数分解的原理进行加密的一种算法。-Using C language RSA encryption algorithm, the use of large prime numbers decomposition of the principle of an algorithm for encryption.
- 2022-07-01 16:49:12下载
- 积分:1
-
ElGamal
elgamal的源程序-ElGamal
- 2023-09-01 04:35:03下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1
-
base64码转换程序,不够完善
base64码转换程序,不够完善-base64 code conversion, not perfect
- 2022-06-13 20:14:40下载
- 积分:1