搜索资源列表
2D-logistic-image-encrytion
- 本matlab函数,利用混沌映射不可预测性,遍历性和敏感性,以它们的参数和初始值的优异特性的,实现一个图像加密算法。我们引入了一个新的二维logistics函数。与现有的混沌映射相比,它具有更广泛的范围内混乱,更好的遍历性,混沌性和relativelylow实施成本。为了研究及其应用,我们提出了一个之乱转换(CMT),以有效地改变图像的像素位置。结合2D-logistics与CMT,我们进一步实现图像加密算法。-In this matlab test,we use the chastic s e
sh
- 本程序实现S盒部分的功能模块,适合初学者对S盒实现的理解,运行环境VC6.0-The program realization of function module in the S box, suitable for beginners S box to achieve understanding, operating environment VC6.0
RNCryptor-cs-master
- AES 256 encryption and decryption algorithm implemented in C#.net with complete testing. AES256 cryptor is implemented as DLL with simple API s for encrypt and decrypt.
SBOX
- 通过编程求出DES算法中8个S-盒的差分分布表和AES中S-盒的差分分布表,体会差分分析的方法。-DES algorithm obtained by programming eight S- boxes in the differential distribution table and AES S- box differential distribution table, experience differential analysis.
SHA1
- 通过编程实现杂凑函数SHA-1,对该算法的设计有较好的认识。比较MD5和SHA-1算法的特点,体会SHA-1比MD5的复杂之处。-By programming the hash function SHA-1, the algorithm has a better understanding of the design. Feature Comparison MD5 and SHA-1 algorithm, SHA-1 complex experience than MD5' s place
RankTest
- 搜索分组密码扩散层MDS矩阵 主要搜索8bit S盒 分组为32的分组密码-search the MDS matrix if not, got the almost perfect matrix
New-folder-(4)
- We begin with choosing two random large distinct primes p and q. We also pick e, a random integer that is relatively prime to (p-1)*(q-1). The random integer e is the encryption exponent. Let n = p*q. Using Euclid s greatest common divisor a
ArcGIS_KeyGen_modified
- Arcgis的破解工具。将bin文件夹中的service.txt替换成该破解工具生成的内容,即可运行破解版Arcgis。至于如何安装,百度经验上有。-in a word,it s very good!
CRC_method
- CRC method for coder string bit s
md5
- 这是一段md5算法程序,此程序可以实现对数据的md5加密-It s a piece of program of md5 to encode a piece of numbers.
DES-S
- des加密算法在MATLAB中,通过VHDL语言的实现-des encryption algorithm in MATLAB, through the realization of VHDL language
Form1
- It s a Word Generator, used to Make Dictionary for brouthforcing
RSA-dec
- 这是一个用rsa加密字符串的例子,使用csp实现。编译环境vc6.0.如果没有安装任何厂家的usbkey驱动,可以将代码中的宏CSP_NAME改为NULL 即使用微软自带的csp-This is an example of using rsa encryption string, use the CSP implementation. Compile environment vc6.0. Without installing any manufacturer usbkey drive, can
ztrees
- *讨论 * 本PKZIP“通缩”的过程中使用了几个哈夫曼树。越 *共源的值由短比特序列表示。 * *每个代码树存储在ZIP文件以压缩形式 *这是本身的长度的霍夫曼编码 *所有的代码串(按升序排列按来源值)。 *实际代码串从长度重构 *解压缩过程中,如在“应用指南”中描述 *(APPNOTE.TXT)分布情况的PKWARE的PKZIP的计划的一部分。-*
square
- 由WeiDai编写并放置在公共主机上 基于Paulo S.L.M. Barreto s开源实施-square.cpp- written and placed in the public domain by Wei Dai Based on Paulo S.L.M. Barreto s public domain implementation
sboxes.tar
- DES 加密 S盒子 Slice算法 S盒子实现-slice Des
sbox
- 混沌加密中利用S盒进行加密,S盒的性能指标测试代码-S-box performance test code
bab2
- this scr ipt talks about encryption in java which containing the example scr ipt to doing classical cryptography such as classic cipher, transposition cipher, affinecipher and so on. so let s learn together-this scr ipt talks about encryption in java
2-1
- 简单的s-des算法,能实现对于小文件的加密和解密,但是对于大文件,会有bug,待修正中-S-des simple algorithm, to achieve for small file encryption and decryption, but for large files, there will be bug, pending amendment
nb
- nb过保护源码,能改成过TP,NP保护学习用,非常棒,使用请附上作者名-nb overprotection source code can be changed over TP, NP protection to learn, great, use please include the author s name