-
一个通过控制系统时间来达到限制软件使用期限的算法程序
一个通过控制系统时间来达到限制软件使用期限的算法程序-A system by controlling the time limit is reached, the software algorithm program using the term
- 2023-06-06 00:05:03下载
- 积分:1
-
DES( Data Encryption Standard)算法,于1977年得到美国政府的正式许可,是一种用56位密钥来加密64位数据的方法。DES算法以被应...
DES( Data Encryption Standard)算法,于1977年得到美国政府的正式许可,是一种用56位密钥来加密64位数据的方法。DES算法以被应用于许多需要安全加密的场合。(如:UNIX的密码算法就是以DES算法为基础的)。-DES (Data Encryption Standard) algorithm, in 1977 the United States government"s official permission, is a key 56 to 64-bit data encryption methods. DES algorithm to be applied to many needs security encryption occasions. (Eg : UNIX password algorithm is to DES algorithm-based).
- 2022-07-27 18:16:04下载
- 积分:1
-
系统可以显示我的CA根证书userds存储,代码参考价值。
可列出系统MY CA ROOT USERDS等存储区的证书,代码参考msdn-system can be shown MY CA ROOT USERDS storage of certificates, reference code VARIANT
- 2022-01-28 16:37:17下载
- 积分:1
-
密码大家Shoup写的数论算法c语言实现,Unix版本
密码大家Shoup写的数论算法c语言实现,Unix版本-password you write the number theory algorithm c language, the Unix version
- 2022-03-29 18:22:09下载
- 积分:1
-
MD5加密算法
MD5加密算法-MD5 encryption algorithm
- 2022-03-20 08:05:26下载
- 积分:1
-
快速去除PDF密码设置,不用安装,直接使用
快速去除PDF密码设置,不用安装,直接使用-Quick removal of PDF password settings, do not need to install, direct use
- 2023-06-09 05:40:03下载
- 积分:1
-
MD5加密算法源代码,个人感觉相当有学习的热的价值,希望大家共同学习,共同进步....
MD5加密算法源代码,个人感觉相当有学习的热的价值,希望大家共同学习,共同进步.-MD5 encryption algorithm source code, personal feeling quite hot the value of learning, I hope everyone learn together and seek common progress.
- 2023-04-17 22:30:03下载
- 积分:1
-
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...
ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map
-
In this paper, a novel block digital image encryp-
tion scheme based on a chaotic coupled map lattices
(CML) is reported. Within this scheme, an original
image is decomposed into sub-blocks with a given size,
and an external secret key with 192-bit is used and
mapped to the system parameters, which are employed
to generate a spatiotemporal chaotic binary sequence
matrix to encrypt the block original image. Besides,
the former sub-block encrypted result will be acted as
a feedback to the following sub-block encryption proc-
ess. The proposed scheme is described in detail, along
with the security analyses such as key space analysis,
sensitivity analysis, information entropy analysis and
correlation coefficients analysis of adjacent pixels. The
computer simulation results indicate that the suggested
image encryption scheme has some properties desir-
able in a good security
- 2022-05-30 11:41:05下载
- 积分:1
-
Data encryption algorithm, a very good Dongdong, a try to know.
数据加密算法,很好的东东,下了试试看就知道了。-Data encryption algorithm, a very good Dongdong, a try to know.
- 2023-01-12 07:25:04下载
- 积分:1
-
DES加密算法和详细描述(HTM)
DES加密算法及详细说明(HTM)
- 2022-11-09 21:15:03下载
- 积分:1