DSSZ
www.dssz.org
Search
Sign in
Create an account
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - encryption
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - encryption - List
【
Crack Hack
】
dealcipher
DL : 0
AES候选算法之一DEAL算法源码,实现基于六轮Feistel网络的加密过程-AES algorithm, one of the candidate source DEAL algorithm, based on six Feistel network encryption process
Update
: 2024-05-17
Size
: 38912
Publisher
:
南瓜布
【
JSP/Java
】
31142331156
DL : 0
ECC 椭圆曲线加密 算法 -ECC Elliptic Curve encryption algorithm
Update
: 2024-05-17
Size
: 12288
Publisher
:
liudayong
【
Compress-Decompress algrithms
】
BaseOnChaosTechnologyImageEncryptResearch
DL : 0
介绍了数字图像加密技术的现状,主要介绍了混沌在数字图像加密领域内的应用。 提供了一个基于双混沌的数字图像加密算法-Introduced a digital image encryption technology, the status quo, mainly introduced the chaos in the field of digital image encryption applications. Provides a dual-chaos-based digital image encryption algorithm
Update
: 2024-05-17
Size
: 1687552
Publisher
:
刘伟
【
Speech/Voice recognition/combine
】
shilianglianghua
DL : 0
使用矢量量化技术实现对图像的加密以及解密-The use of vector quantization technique for image encryption and decryption
Update
: 2024-05-17
Size
: 53248
Publisher
:
lauren
【
Crack Hack
】
DES
DL : 0
DES(Data Encryption Standard) 加密系统的 C 语言源代码-DES (Data Encryption Standard) encryption system of the C language source code
Update
: 2024-05-17
Size
: 8192
Publisher
:
leiuchan
【
Crack Hack
】
source
DL : 0
ECC实现的原代码,包括椭圆曲线的生成和对文件的加密解密。-ECC to achieve the original code, including elliptic curve generation and the encryption and decryption of documents.
Update
: 2024-05-17
Size
: 74752
Publisher
:
【
Crack Hack
】
jpegshow
DL : 0
图像加密与解密代码,容易修改参数,供大家参考-Image encryption and decryption code, easy to modify the parameters for your reference
Update
: 2024-05-17
Size
: 1866752
Publisher
:
cc
【
Crack Hack
】
java_encrypt_decrypt
DL : 0
1、利用公钥密码技术实现对称密码技术密钥的分配; 2、利用所分配的对称密钥对通信内容进行加/解密; -1, the use of public key cryptographic techniques to achieve symmetric cryptography key distribution 2, using the symmetric key by the distribution of the content of communication encryption/decryption
Update
: 2024-05-17
Size
: 17408
Publisher
:
张海滨
【
Crack Hack
】
securitycode
DL : 0
hill playfair vigenere 密码加密算法 (C++实现)-hill playfair vigenere password encryption algorithm (C++ achieve)
Update
: 2024-05-17
Size
: 22528
Publisher
:
cpuno1111
【
Crack Hack
】
hashreplacement
DL : 1
在图像加密中用到的md5算法,也就是哈希置换-In the image of the md5 encryption algorithm used, that is, hash replacement
Update
: 2024-05-17
Size
: 1024
Publisher
:
guaiguai
【
Crack Hack
】
binaryextract
DL : 1
二值图像的信息隐藏,用到md5加密和改进后的置乱算法-Binary Image Information Hiding, use md5 encryption and improved hashing algorithm
Update
: 2024-05-17
Size
: 1024
Publisher
:
guaiguai
【
mpeg mp3
】
Implementation_and_improvement_of_MPEG4_video_encr
DL : 0
探讨了基于zigzag置乱的MPEG4视频数据加密技术,指出了这种方案在安全性方面的不足,提出了改进方 案。改进的方案中AC系数用不同的置乱表置乱,DC系数用高强度的加密算法AES加密。最后给出了改进后的加密效 果,并且从加密速度,安全性和码流变化三个指标衡量了该方案的应用价值。 -Discussion based on the zigzag Scrambling MPEG4 video data encryption technology, pointing out that such a program in the security deficiencies, suggestions to improve the program. Improvement program with a different AC coefficient table Scrambling Scrambling, DC coefficient of high-strength encryption algorithm AES encryption. Finally, the effect of the improved encryption, and from the encryption speed, safety and code changes in the three indicators to measure the flow of the program application value.
Update
: 2024-05-17
Size
: 165888
Publisher
:
吴笛
【
Crack Hack
】
Scx3.1
DL : 0
This file contains a C++Builder 4 project called SimplyChaos-X ver 3.1 (SCX31). SCX31 is an encryption tool. I designed it as my graduation paper work. SCX31 is a symmetric stream cipher built on chaos function, one time pad cipher and inspiration from Ground Effect (aviation). The key length can be up to 40 characters (320 bits).
Update
: 2024-05-17
Size
: 24576
Publisher
:
范杰
【
Crack Hack
】
AES
DL : 0
AES-rijndael 算法的详细资料, 包括 AES加密算法中的SBox及其C语言实现.pdf FIPS197(chs).pdf FIPS197.pdf nist.url Rijndael.pdf rijndael算法流程.swf Rijndael算法深入的研究.doc Rijndael算法优化技术研究.doc 公钥密码体制与有限域(2).pdf 一种基于伽罗瓦域的密码系统.pdf-AES-rijndael algorithm detailed information, including the AES encryption algorithm in C language and its SBox realize. PdfFIPS197 (chs). PdfFIPS197.pdfnist.urlRijndael.pdfrijndael flow algorithm. SwfRijndael-depth study of algorithms. DocRijndael algorithm optimization technology research. Doc public key cryptosystem over finite fields and (2). pdf Galois field based on the password system. pdf
Update
: 2024-05-17
Size
: 1982464
Publisher
:
张鲁夺
【
Graph program
】
Chens_chaos
DL : 0
混沌 加密 审计-Chaotic Encryption audit
Update
: 2024-05-17
Size
: 3072
Publisher
:
金羽
【
Crack Hack
】
Logistic_chaos
DL : 0
混沌加密 映射 实现-Chaotic encryption mapping realize
Update
: 2024-05-17
Size
: 1024
Publisher
:
金羽
【
Crack Hack
】
hundun
DL : 0
基于三维混沌序列的数字图像加密算法,是一种比较复杂的加密算法-Chaotic sequence based on the three-dimensional digital image encryption algorithm is a more complex encryption algorithm
Update
: 2024-05-17
Size
: 1024
Publisher
:
laden
【
Special Effects
】
code
DL : 0
基于LSB的图像中数据加密隐藏算法程序 图像的组成无非是一些字符串或者一些字节组成的字符串,然而,每一个字节数据位的重要度并不是一样的,两个相邻字节往往只有低位是不一样的。例如:00100110和00100111代表了两个不同渐变度的红色,但是就人眼是分辨不出来的。最低有效位LSB算法,就是利用这一点,达到图像压缩,或者数字水印的功能。 -LSB of the image-based data encryption to hide the image composition algorithm procedure is nothing more than some number of bytes or string composed of string, however, one byte for each data bit is not an important degree of the same, and two adjacent words section, usually only low level is not the same. For example: 00100110 and 00100111 represent the gradient of two different degrees of red, but on the human eye is not out to tell. Least significant bit LSB algorithm, is to take advantage of this point, to achieve image compression, or digital watermark feature.
Update
: 2024-05-17
Size
: 248832
Publisher
:
aaa
【
Crack Hack
】
Permutation
DL : 0
Column permutation cipher是基于置换的加密解密方式。利用本程序可实现Column permutation cipher的加密和解密。 -Column permutation cipher is based on the replacement of the encryption and decryption methods. This procedure can be realized using Column permutation cipher encryption and decryption.
Update
: 2024-05-17
Size
: 332800
Publisher
:
马茜
【
CA auth
】
RSA_Matlab
DL : 0
RSA Encryption and Decryption using Matlab by Thunyawat Rajatasereekul and Voranon Kiettrsalpipop
Update
: 2024-05-17
Size
: 92160
Publisher
:
lena
«
1
2
...
10
11
12
13
14
15
16
17
18
19
20
...
50
»
DSSZ
is the largest source code store in internet!
Contact us :
1999-2046
DSSZ
All Rights Reserved.