资源列表
transposition
- In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes
RC4-Prog
- Example 1. To find 1537 x 4248 modulo 10, you could multiply out and take the last digit, but a better way would be to replace 1537 by 7 and 4248 by 8 to start, find 7 x 8 = 56, and then take 56 mod 10 to get 6 as the answer. A handy standard no
diffeehellmanPROGRAM
- Example 1. To find 1537 x 4248 modulo 10, you could multiply out and take the last digit, but a better way would be to replace 1537 by 7 and 4248 by 8 to start, find 7 x 8 = 56, and then take 56 mod 10 to get 6 as the answer. A handy standard no
DES-Program
- DES was once a predominant symmetric-key algorithm for the encryption of electronic data. It was highly influential in the advancement of modern cryptography in the academic world.
There-are-three-types-of-cryptography-techniques.
- Caesar cipher is a simple substitution cipher where each letter in the plain text is replaced with a letter a fixed number of places down the aplhabet. EXAMPLE If the number of places to shift is 3, the letter A would be converted to ltter D. Usi
Guo10
- Test for GUO10 chaotic map image encode/decode algorithm
ds5250
- ds5250测试例子,用于数据的加密和解密-ds5250 simple test exmple,use to enc and dec
watermark-image-2131
- CODING FOR WATERMARKING
chisquare
- this chi square test for the data hiding image technique-this is chi square test for the data hiding image technique
A
- 2015说摸fdg fdg g fg -sdf a fds sf sfg sf dfg sfd
rar
- 利用哈夫曼数据编码实现的解压 加密与压缩文件的功能-RAR system
DESwithHmac
- des加密算法及hmac验证,可用于加密文件-des encryption