资源列表
ElGamal
- 用椭圆曲线实现ElGamal算法,根据来源于国密局SM2算法的标准参数,Fp-192曲线,运用一个大数类能够实现密码算法所需要的基本运算。-Using elliptic curve ElGamal algorithm, according to secret from the State Bureau of SM2 algorithm standard parameters, Fp-192 curve, the use of a class of large numbers cryptograp
Logistic
- vs 2010编程验证Logistic映射的初值敏感性和对参数的敏感性,并用matlab编程作图实现-c++ programming, verification Logistic mapping initial sensitivity and sensitivity to parameter and plotted using matlab programming
Cryptography-and-Network-Security
- 用C/C++实现加解密算法及其应用:DES(或AES)和基于DES(或AES)的CMAC。-With C/C++ achieve encryption and decryption algorithm and its application: DES (or AES) and based on DES (or AES) of CMAC.
TORO-Sentinel-SuperPro-Emulator-1.7
- TORO Sentinel SuperPro Emulator 1.7模拟工具-TORO Sentinel SuperPro Emulator 1.7
defoxiv_vfp9
- vfp exe protector, anti decompiling tool, worlds Best protect against cracking, decompiling of Visual FoxPro exe files, this file requires vfp9 runtime lib files on you pc to run.-vfp exe protector, anti decompiling tool, worlds Best protect against
Keygen
- 注册机,可以注册:USB for Remote Desktop;Sound over RDP;Virtual serial port kit;network serial port kit;serial port splitter;serial port mapper等.... -RI, you can register: USB for Remote Desktop Sound over RDP Virtual serial port kit network serial port
signTool(2)
- 微软SignTool工具,实现对exe,dll添加数字签名-SignTool
hash
- 哈希函数的matlab代码,此函数不可逆,具有加密功能。-Hash function matlab code, this function is not reversible, with encryption features.
dsa
- dsa加密算法的visual C++ 实现,里面用到了openssl-visual C++ dsa encryption algorithm implementations, which uses the openssl
Elgamal
- Elgamal密码算法,用mfc做的界面,实现elgamal的加密、解密和签名-Elgamal cryptographic algorithms, interface with mfc do realize elgamal encryption, decryption and signature
VC6LineNumberAddin
- vc6.0显示代码行数破解工具,打开vc6,菜单栏:Tools -> customize -> Add-ins and Macro Files选中VC6LineNumber Developer Studio Add-in - Vc6.0 show lines of code crackers
2D-logistic-image-encrytion
- 本matlab函数,利用混沌映射不可预测性,遍历性和敏感性,以它们的参数和初始值的优异特性的,实现一个图像加密算法。我们引入了一个新的二维logistics函数。与现有的混沌映射相比,它具有更广泛的范围内混乱,更好的遍历性,混沌性和relativelylow实施成本。为了研究及其应用,我们提出了一个之乱转换(CMT),以有效地改变图像的像素位置。结合2D-logistics与CMT,我们进一步实现图像加密算法。-In this matlab test,we use the chastic s e