Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - encryption
Search - encryption - List
DL : 0
AES候选算法之一DEAL算法源码,实现基于六轮Feistel网络的加密过程-AES algorithm, one of the candidate source DEAL algorithm, based on six Feistel network encryption process
Update : 2024-05-17 Size : 38912 Publisher : 南瓜布

DL : 0
ECC 椭圆曲线加密 算法 -ECC Elliptic Curve encryption algorithm
Update : 2024-05-17 Size : 12288 Publisher : liudayong

介绍了数字图像加密技术的现状,主要介绍了混沌在数字图像加密领域内的应用。 提供了一个基于双混沌的数字图像加密算法-Introduced a digital image encryption technology, the status quo, mainly introduced the chaos in the field of digital image encryption applications. Provides a dual-chaos-based digital image encryption algorithm
Update : 2024-05-17 Size : 1687552 Publisher : 刘伟

使用矢量量化技术实现对图像的加密以及解密-The use of vector quantization technique for image encryption and decryption
Update : 2024-05-17 Size : 53248 Publisher : lauren

DL : 0
DES(Data Encryption Standard) 加密系统的 C 语言源代码-DES (Data Encryption Standard) encryption system of the C language source code
Update : 2024-05-17 Size : 8192 Publisher : leiuchan

DL : 0
ECC实现的原代码,包括椭圆曲线的生成和对文件的加密解密。-ECC to achieve the original code, including elliptic curve generation and the encryption and decryption of documents.
Update : 2024-05-17 Size : 74752 Publisher :

DL : 0
图像加密与解密代码,容易修改参数,供大家参考-Image encryption and decryption code, easy to modify the parameters for your reference
Update : 2024-05-17 Size : 1866752 Publisher : cc

1、利用公钥密码技术实现对称密码技术密钥的分配; 2、利用所分配的对称密钥对通信内容进行加/解密; -1, the use of public key cryptographic techniques to achieve symmetric cryptography key distribution 2, using the symmetric key by the distribution of the content of communication encryption/decryption
Update : 2024-05-17 Size : 17408 Publisher : 张海滨

DL : 0
hill playfair vigenere 密码加密算法 (C++实现)-hill playfair vigenere password encryption algorithm (C++ achieve)
Update : 2024-05-17 Size : 22528 Publisher : cpuno1111

在图像加密中用到的md5算法,也就是哈希置换-In the image of the md5 encryption algorithm used, that is, hash replacement
Update : 2024-05-17 Size : 1024 Publisher : guaiguai

二值图像的信息隐藏,用到md5加密和改进后的置乱算法-Binary Image Information Hiding, use md5 encryption and improved hashing algorithm
Update : 2024-05-17 Size : 1024 Publisher : guaiguai

探讨了基于zigzag置乱的MPEG4视频数据加密技术,指出了这种方案在安全性方面的不足,提出了改进方 案。改进的方案中AC系数用不同的置乱表置乱,DC系数用高强度的加密算法AES加密。最后给出了改进后的加密效 果,并且从加密速度,安全性和码流变化三个指标衡量了该方案的应用价值。 -Discussion based on the zigzag Scrambling MPEG4 video data encryption technology, pointing out that such a program in the security deficiencies, suggestions to improve the program. Improvement program with a different AC coefficient table Scrambling Scrambling, DC coefficient of high-strength encryption algorithm AES encryption. Finally, the effect of the improved encryption, and from the encryption speed, safety and code changes in the three indicators to measure the flow of the program application value.
Update : 2024-05-17 Size : 165888 Publisher : 吴笛

DL : 0
This file contains a C++Builder 4 project called SimplyChaos-X ver 3.1 (SCX31). SCX31 is an encryption tool. I designed it as my graduation paper work. SCX31 is a symmetric stream cipher built on chaos function, one time pad cipher and inspiration from Ground Effect (aviation). The key length can be up to 40 characters (320 bits).
Update : 2024-05-17 Size : 24576 Publisher : 范杰

DL : 0
AES-rijndael 算法的详细资料, 包括 AES加密算法中的SBox及其C语言实现.pdf FIPS197(chs).pdf FIPS197.pdf nist.url Rijndael.pdf rijndael算法流程.swf Rijndael算法深入的研究.doc Rijndael算法优化技术研究.doc 公钥密码体制与有限域(2).pdf 一种基于伽罗瓦域的密码系统.pdf-AES-rijndael algorithm detailed information, including the AES encryption algorithm in C language and its SBox realize. PdfFIPS197 (chs). PdfFIPS197.pdfnist.urlRijndael.pdfrijndael flow algorithm. SwfRijndael-depth study of algorithms. DocRijndael algorithm optimization technology research. Doc public key cryptosystem over finite fields and (2). pdf Galois field based on the password system. pdf
Update : 2024-05-17 Size : 1982464 Publisher : 张鲁夺

混沌 加密 审计-Chaotic Encryption audit
Update : 2024-05-17 Size : 3072 Publisher : 金羽

混沌加密 映射 实现-Chaotic encryption mapping realize
Update : 2024-05-17 Size : 1024 Publisher : 金羽

DL : 0
基于三维混沌序列的数字图像加密算法,是一种比较复杂的加密算法-Chaotic sequence based on the three-dimensional digital image encryption algorithm is a more complex encryption algorithm
Update : 2024-05-17 Size : 1024 Publisher : laden

DL : 0
基于LSB的图像中数据加密隐藏算法程序 图像的组成无非是一些字符串或者一些字节组成的字符串,然而,每一个字节数据位的重要度并不是一样的,两个相邻字节往往只有低位是不一样的。例如:00100110和00100111代表了两个不同渐变度的红色,但是就人眼是分辨不出来的。最低有效位LSB算法,就是利用这一点,达到图像压缩,或者数字水印的功能。 -LSB of the image-based data encryption to hide the image composition algorithm procedure is nothing more than some number of bytes or string composed of string, however, one byte for each data bit is not an important degree of the same, and two adjacent words section, usually only low level is not the same. For example: 00100110 and 00100111 represent the gradient of two different degrees of red, but on the human eye is not out to tell. Least significant bit LSB algorithm, is to take advantage of this point, to achieve image compression, or digital watermark feature.
Update : 2024-05-17 Size : 248832 Publisher : aaa

DL : 0
Column permutation cipher是基于置换的加密解密方式。利用本程序可实现Column permutation cipher的加密和解密。 -Column permutation cipher is based on the replacement of the encryption and decryption methods. This procedure can be realized using Column permutation cipher encryption and decryption.
Update : 2024-05-17 Size : 332800 Publisher : 马茜

DL : 0
RSA Encryption and Decryption using Matlab by Thunyawat Rajatasereekul and Voranon Kiettrsalpipop
Update : 2024-05-17 Size : 92160 Publisher : lena
« 1 2 ... 10 11 12 13 14 1516 17 18 19 20 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.