Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - encryption
Search - encryption - List
图像加密,使用量logistic混沌映射对图像进行了加密和解密,可以直接运行-Image encryption, usage logistic chaotic map for image encryption and decryption, you can directly run
Update : 2024-05-16 Size : 188416 Publisher : renguorui

一篇讨论各种加密算法的论文,着重运行了猫脸变换,混沌学加密和水印算法,原创有图有程序。-A discussion of various encryption algorithms papers, focusing running cat face transformation, Chaos encryption and watermarking algorithm, the original map with the program.
Update : 2024-05-16 Size : 4681728 Publisher : 周煜

基于logistic混沌系统的一种图像加密和解密算法。用于灰度图像的加密和解密。-A image encryption.
Update : 2024-05-16 Size : 3072 Publisher : 胡贵祥

Microsoft CryptoAPI encryption technology.More detail.From architecture to specific CryptoAPI, CSP.And encryption process, the CA process seriously, the classification of encryption.
Update : 2024-05-16 Size : 33792 Publisher : long

采用流-管道模式对文件进行加密,有三个管道,三种加密方式。并进行了解密。-Using flow- Pipeline mode to encrypt files, there are three pipelines, three encryption methods. And decryption.
Update : 2024-05-16 Size : 256000 Publisher : 贺永成

这个算法是用C语言实现的DES加密算法,代码量少,仅100行。-This algorithm is the DES encryption algorithm using C language, less code, only 100 rows.
Update : 2024-05-16 Size : 5120 Publisher : 张晨

DL : 0
Vb MD5 RSA RC4加密测试程序+源码下载,使用有一个自定义的加密DLL,EncryptionDLL.dll。运行效果如示例截图所示。可在对应的加密方法栏中输入测试字符,然后点击“加密”按钮即可,使用方便,若了解详细情况请下载源码后打开代码文件查看。测试注意:本程序运行“demo”文件夹中的工程,并需要注册EncryptionDLL.dll组件,打开工程文件,选择“工程”/“引用”命令,选择组件位置。-encryption of MD5 RSA RC4, using VB. you need to register the EncryptionDLL.dll
Update : 2024-05-16 Size : 23552 Publisher : rjoweohr

用vb实现的国外21中加密/解密方法和54中压缩/解压缩方法大集合.-21 encryption/decryption moduals, using VB to realize them
Update : 2024-05-16 Size : 173056 Publisher : rjoweohr

对TXT文件进行简单的加密解密工作,适用于一般的个人使用,不适合公开场合-To decrypt the TXT file for a simple encryption work, applicable to the general personal use, not suitable for the public
Update : 2024-05-16 Size : 665600 Publisher : 于泰风

Image encryption using bitplanes, first image decomposed into their bitplanes,some key image applied for encryption,it will be decrypted if and only if exact key used.
Update : 2024-05-16 Size : 2048 Publisher : santosh

Blowfish.java generates the symmetrickey using Blowfish algorithm. Key size assigned here is 128 bits. It works forkey size of 256 and 448 bits also. Encryption and decryption method is writtenbased on Blowfish algorithm. Message to encrypt can be given as input.Encrypted and decrypted text is displayed in message dialog.
Update : 2024-05-16 Size : 27648 Publisher : saadawais

DES.java generates the symmetric key using DES algorithm. Key size assigned here is 64 bits. It works only for the key size of 64 bits. 56 bits is mentioned in the coding remaining 8bits is accessed inbuilt package. Encryption and decryption method is written based on DES algorithm. Message to encrypt can be given as input. Encrypted and decrypted text is displayed in message dialog.-DES.java generates the symmetric key using DES algorithm. Key size assigned here is 64 bits. It works only for the key size of 64 bits. 56 bits is mentioned in the coding remaining 8bits is accessed inbuilt package. Encryption and decryption method is written based on DES algorithm. Message to encrypt can be given as input. Encrypted and decrypted text is displayed in message dialog.
Update : 2024-05-16 Size : 25600 Publisher : saadawais

AES is the Advanced Encryption Standard, a United States government standard algorithm for encrypting and decrypting data. The standard is described in Federal Information Processing Standard (FIPS) 197.1 On January 2, 1997, The National Institute of Standards and Technology (NIST) published a request for comments for the “Development of a Federal Information Processing Standard for Advanced Encryption Standard.”2 NIST sought to “consider alternatives that offer a higher level of security”3 than that offered by the Data Encryption Standard (DES), which grew vulnerable to brute-force attacks due to its 56-bit effective key length.AES candidates were required to support a symmetric block cipher that supported multiple key lengths. The algorithm had to be publicly defined, free to use, and able to run efficiently in both hardware and software
Update : 2024-05-16 Size : 433152 Publisher : Amr

DL : 0
VB 文本文件加密解密,比较好的源码实例。-VB text file encryption and decryption (good)
Update : 2024-05-16 Size : 10240 Publisher : wangkejun

程序设计一个加密和解密的算法,在对一个指定的字符串加密之后,利用解密函数能够对密文进行解密,显示明文信息-Programming an encryption and decryption algorithm, after a specified string encryption function using the decrypted ciphertext can be decrypted plaintext display
Update : 2024-05-16 Size : 1342464 Publisher :

Fast and Secure Real-Time Video Encryption
Update : 2024-05-16 Size : 1905664 Publisher : selva

Username and Password encryption
Update : 2024-05-16 Size : 159744 Publisher : abhijeet

DL : 0
Matlab image encryption
Update : 2024-05-16 Size : 4096 Publisher : Raj

Linux下的基于OMAP5910加密终端的驱动文件。-Under Linux based on OMAP5910 encryption terminal driver file.
Update : 2024-05-16 Size : 131072 Publisher : 张文

登陆网站时对密码的加密和解密、数字签名,使得通信安全传输。-Landing site for password encryption and decryption, digital signature, making communications secure transmission
Update : 2024-05-16 Size : 216064 Publisher : 李冰冰
« 1 2 ... 42 43 44 45 46 4748 49 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.