-
BASE64 encoding/decoding of the source code VC
BASE64编码/解码 处理的VC源代码-BASE64 encoding/decoding of the source code VC
- 2022-04-25 08:12:40下载
- 积分:1
-
EXELOCK 1.83 EXE文件加密器的源代码
EXELOCK 1.83 EXE文件加密器的源代码-EXELOCK 1.83 EXE file encryption for the source code
- 2022-07-09 03:24:27下载
- 积分:1
-
这是一个易于使用的MD5算法的C++类,这个类可以添加技术。
这是一个好用的MD5的C++类;这个类可以加在控制台
程序中也可用在MFC中, 并且提供了详细的错误处理
函数,是一个安全的类。例程是一个MD5的MFC程序,
支持字符串和文件两种输入-This is an easy to use the MD5 of the C++ category this category can be added to the console program can also be used in the MFC and to provide a detailed error handling function, is a type of security. MD5 is a routine procedure of MFC, and documentation to support two types of input string
- 2022-02-06 23:27:33下载
- 积分:1
-
密钥盘生成程序,附使用说明
密钥盘生成程序,附使用说明-Key disk generation process, with the use of
- 2022-07-09 16:35:34下载
- 积分:1
-
文件加密的过滤驱动程序,适用于大部分的文件加密软件
文件加密的过滤驱动程序,适用于大部分的文件加密软件-File Encryption filter driver, applies to most of the file encryption software
- 2022-06-30 04:31:17下载
- 积分:1
-
防盗decryot软件
Immobilizer decryot software
- 2022-03-30 21:34:49下载
- 积分:1
-
aes加密算法。用delphi语言实现。位数为128。
aes加密算法。用delphi语言实现。位数为128。-Aes encryption algorithm. Delphi use language. Median 128.
- 2022-02-02 08:42:49下载
- 积分:1
-
提供加密的聊天程序。使用对称加密算法…
提供加密的c/s 聊天程序。用到对称加密算法和非对称加密算法,实现客户服务器的安全聊天-Provide encrypted c/s chat program. Using symmetric encryption algorithms and asymmetric encryption algorithms, to achieve the security of client-server chat
- 2022-05-21 16:34:45下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1
-
a small encryption program
java的一个小加密程序-a small encryption program
- 2022-02-24 18:48:54下载
- 积分:1