搜索资源列表
AES
- 通过这道程序的编写,进一步加深了对AES的理解,也了解了模块化设计的基本思想,编程的时候,把一个大任务分解是很重要的,针对相应的子任务所编写的一段功能独立的代码或一个功能模块,在程序设计时,我们可以把程序中功能相对独立的模块用函数来实现。这样做,不仅可以使程序条理清晰,便于维护。而且,通过重复使用某些函数,可以节省软件开发时间。对一个大问题先从一个大的全局上去考虑,分成几个大的模块,将每个大的模块进一步分解。该程序就是这样的思想,将加密分成三大步骤,对第二大步骤的9次循环的每次都要进行4个操作。
poj1811
- 程序实现了大素数的判断和如果不是素数,则其可分解的最小的素数-program of large prime numbers and if the judgment is not prime, then decomposition of the smallest prime number
分解质因数
- 这个是简单的用vb编程编的分解质因数的程序和已经编译了的exe文件-This is a simple program with vb series of the quality factor of the decomposition process and is compiled by the exe files
RSAprogram
- 本程序使用了欧几里得算法求乘法逆元,采用二进制分解算法求a^b mod n,算法简明,思路清晰,适合深入了解程序的基本原理,直接运行demo文件即可完成程序的运行。-This program uses the Euclidean Algorithm for Finding multiplicative inverse, using the binary decomposition algorithm for getting a ^ b mod n, algorithm concise, clea
WinNTL-5_5_2
- ntl是有纽约大学研究开发的专门处理大数计算的一个静态库,在取模,大数分解方面有很广泛的应用-ntl is a New York University specializing in research and development of large numbers for calculation of a static library, in modulus, decomposition of large numbers has very broad application
desandrsa
- DES算法全称为Data Encryption Standard,即数据加密算法,DES算法把64位的明文输入块变为64位的密文输出块,它所使用的密钥也是64位。RSA的安全性依赖于大数分解。公钥和私钥都是两个大素数( 大于 100个十进制位)的函数。本程序为适合初学者的rsa算法java源码及des源码,开发环境eclipse3.4-DES algorithm called the Data Encryption Standard, that is, data encryption algor
RSA-vb
- RSA是被研究得最广泛的公钥算法,从提出到现在已近二十年,经历了各种攻击的考验,逐渐为人们接受,普遍认为是目前最优秀的公钥方案之一。RSA的安全性依赖于大数的因子分解,但并没有从理论上证明破译RSA的难度与大数分解难度等价。即RSA的重大缺陷是无法从理论上把握它的保密性能如何,而且密码学界多数人士倾向于因子分解不是NPC问题。-RSA is the most widely studied of the public key algorithm, from the nearly two decad
hundun_svd
- 基于混沌加密的奇异值分解算法的源代码,实现了水印技术的预处理及嵌入提取过程。-Chaos-based encryption algorithm, singular value decomposition of the source code, a watermark embedding technology and extraction pretreatment.
an_intellegent_audio_water_marking_based_on_dwt-s
- All three, Discrete Wavelet Transform (DWT) - Singular Value Decomposition (SVD) and Adaptive Tabu Search (ATS) have been used as mathematical tools for embedding data into an audio signal. In this paper, we present a new robust audio waterma
factor
- 分解大数质因子的Shor算法的提出,对RSA公钥密码体系构成了很大的威胁,本程序实现2种算法的大数因子分解。-Decomposition of large number of quality factors in Shor algorithm proposed, on the RSA public key cryptography system constitutes a great threat, the program achieved two kinds of algorithm for
jiamisuanfa
- 对个一窜字符流进行大素数的加密算法,此法是基于大素数分解的原理进行-On the one-character stream channeling large prime numbers encryption algorithms, this method is based on large prime numbers decomposition principle
vigenere
- 计一个vigenere密码类,类的对象各自拥有不用的密匙。用不用对象加密相同的明文,将会获得不同的密文。加密过程如下:设密匙为K=k1k2.......kn,明文为M=m1m2.......mn,密文为C=c1c2.......cn,其中k1k2.........kn,m1m2...........mn, c1c2.........cn,每个都代表一个字母。 将字母A到Z编号,从0到25,那么它们之间有这样的对应关系:ci=(mi+ki)mod26。 例如,M=data sec
RSAsuanfa
- 1978年就出现了这种算法,它是第一个既能用于数据加密也能用于数字签名的算法。 RSA的安全性依赖于大数难于分解这一特点。公钥和私钥都是两个大素数(大于100个十进制位)的函数。-In 1978 came the algorithm, it is the first can used for data encryption can also be used as a digital signature algorithm. The RSA security depends on the char
Fusion_old
- A novel higher order singular value decomposition (HOSVD)- based image fusion algorithm is proposed. The key points are given as follows: 1) Since image fusion depends on local information of source images, the proposed algorithm picks out info
New-svd-1
- Singular value decomposition takes a rectangular matrix of gene expression data (defined as A, where A is a n x p matrix) in which the n rows represents the genes, and the p columns represents the experimental conditions.
DES
- 一般网上的资料都是DES没有分块的代码,这样不利于初学者理解掌握,这个代码就很好的将整体代码按照模块进行分解和说明,可以编译成功。-General information on the Internet is no DES block of code, and this is not conducive for beginners to understand and grasp, the code will be a very good overall decomposition module
ACV
- 分解各种劲舞团的ACV分解器比较好用的一款!h很赞哦-Decomposition of audition ACV resolver is listed with a! H good oh!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
RSA
- RSA算法是第一个能同时用于加密和数字签名的算法,也易于理解和操作。RSA是被研究得最广泛的公钥算法,从提出到现在已近二十年,经历了各种攻击的考验,逐渐为人们接受,普遍认为是目前最优秀的公钥方案之一(The RSA algorithm is the first algorithm that can be used for both encryption and digital signature at the same time. It is also easy to understand an