资源列表
i2 reader
- i2 reader for oscam fixed emm errors
Lyapunov-exponent-curve-of-logistic
- 包含了产生逻辑斯蒂映射的代码,以及绘制了逻辑斯蒂映射的分岔图以及李雅普诺夫指数的图像,还有程序运行结果的图像.李雅普诺夫指数在研究动力系统的分岔、混沌运动特征中起着重要的作用,,李雅普诺夫指数大于0,处于混沌状态. -The logistic map contains the code, and draw the image bifurcation diagram of logistic map and Lyapunov exponent, image and program results.
sts-2.1.2
- NIST随机数检测工具源代码,针对国密送检产品随机数检测预测试-NIST random number detection tool source code, according to the state secret inspection products pre detection random number test
BB84-Client-master
- One of the Quantum cryptology protocol, BB84 protocol implementation in Java.
rsacsp
- * dlls/rsaenh/rsaenh.c 0003 * RSAENH - RSA encryption for Wine-* dlls/rsaenh/rsaenh.c 0003 * RSAENH- RSA encryption for Wine
mschapv2acc-master
- chap协议破解密码,使用暴力破解,所用时间根据密码长度决定-The chap protocol clears
LabViewv3.1
- 这是一款密码破解软件,但是时间比较长,强暴破解方法-This is a password cracking software, but time is longer, rape cracking method
BLAKE2-master
- BLAKE2 are cryptographic hash functions based on Dan Bernstein s Cha stream cipher, but a permuted copy of the input block, XORed with some round constants, is added before each Cha round. Like SHA-2, there are two variants differing in the word size
Phelix-Optimized
- Phelix 1 is a high-speed stream cipher with a built-in MAC func- tionality. It is efficient in both hardware and software. On current Pentium CPUs, Phelix has a per-packet overhead of less than 900 clocks, plus a per- byte cost well under 8
SM3HASH
- SM3算法原理,脱离密码相关安全库,单独利用基本数据类型实现SM3摘要算法,理解SM3算法原理-the hash algorithm of SM3,the basic standard of Chinese cryptographic algorithm SM3
Decryption-algorithmCPPcode
- 常见的解密算法,包括详细的示例和算法注释-Common decryption algorithms, including detailed examples and algorithmic annotations
new
- LSB steganography Encoding