搜索资源列表
1. A fast video encryption scheme based-on chaos.
- 这是一篇有关混沌在视频中加密的文章,题目为:A fast video encryption scheme based-on chaos。不过看看懂还是要花一些时间的,不过我可以和大家交流。还有这是英文作写。-This is a chaos in the video encryption article entitled : A fast encryption scheme based video-on chaos. But look at to understand or take some t
ibe-0.7.2
- The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, \"Identity-Based Encryption from the Weil Pairing\", CRYPTO 2001.) There are a few modifications and additions. T
encryption-software
- 用Java开发的加密程序,使用三重DES加密方案有效提高安全性-Encryption program written in Java, using the Triple DES encryption scheme is effective to improve security
Basedonsmartcardellipticcurvedynamicstatusauthenti
- 基于智能卡的身份认证应用被普遍认为是一项极具前沿技术,由于其存储空间与处理能力的限制,现有的身份认证方案当应用到一些受限制环境下,如无线终端等,都存在安全性或效率上的不足。该文利用椭圆曲线密码系统,构建了一个新的、高效的、可证安全的身份认证方案。-Based on smart card authentication application is generally considered one of the greatest cutting-edge technology, because of
mixed_encryption
- 本系统实现了一个基本的混合密码系统。它使用DES作为对称密钥算法,RSA作为公开密钥算法。本系统特点如下:1:提供了俩个加密接口。混合加密,DES加密。2:本系统的DES可以进行1次DES加密(标准DES加密)和3次DES加密。它会根据密钥长度,自动选择加密方案-Implementation of the system a basic hybrid cryptosystem. It uses DES as the symmetric key algorithm, RSA public key a
10.1.1.1.5181
- 一个智能卡加密的好文章,详细记述了一个加强的智能卡加密算法的实现-Abstract – Hwang and Li proposed the first remote user authentication scheme using smart cards to solve the problems of Lamport scheme. Unfortunately, Hwang and Li’s scheme has some security weaknesses. First, C
CKCRIPT
- There is a DES crypto programm. Only for lab. To make some mesurements. And some Heming scheme s in a EWB (Electronic work Bench)
RSA
- RSA算法的实现,加密解密的应用过程中,通常会用到的算法-the implement of the RSA scheme
AES-Crypto-SN-Generator
- AES 是一种使用安全码进行信息加密的标准。 它支持 128 位、192 位和 256 位的密匙。 加密算法的实现在 ElAES.pas 单元中。 本人将其加密方法封装在 AES.pas 单元中, 只需要调用两个标准函数就可以完成字符串的加密和解密。 (* 密匙长度 *) 128 位支持长度为 16 个字符 192 位支持长度为 24 个字符 256 位支持长度为 32 个字符 所有加密和解密操作在默认情况下为 128 位密匙。-
AnImageEncryptionSchemeBasedonChaoticMap
- ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomp
Newcolorimageencryptionalgorithmbasedonchaoticsequ
- IEEE2008年文章An Image Encryption Scheme Based on Chaotic Map -An Image Encryption Scheme Based on Chaotic Map
Signature
- 椭圆曲线数字签名方案的研究与改进,大学教育网的研究成果,得来不易-Elliptic Curve Digital Signature Scheme Research and Improvement
Program
- this code implement an Order Preserving Encryption Scheme (OPES).
shrdmem
- The paper introduces total scheme and system structure, also the hardware design of the system in detail. -The paper introduces total scheme and system structure, also the hardware design of the system in detail.
an_intellegent_audio_water_marking_based_on_dwt-s
- All three, Discrete Wavelet Transform (DWT) - Singular Value Decomposition (SVD) and Adaptive Tabu Search (ATS) have been used as mathematical tools for embedding data into an audio signal. In this paper, we present a new robust audio waterma
20040515
- 对IBC的密钥托管问题进行了深入的研究,通过对近年来的密钥管理方案的分析,提出了一个新的强壮的密钥管理方案。-Key escrow problem of IBC conducted in-depth research in recent years through the analysis of key management scheme proposed a new strong key management program.
Shamir
- Shamir Scheme. Implmentació a cryptographic protocol based on the threshold scheme.
01
- 单报数据加密方案,基于服务器端程序设计步骤。-One reported data encryption scheme, based on server-side programming steps.
secret-sharing-scheme
- :利用椭圆曲线密码算法设计了一个新的1"3限多重秘密分享方案,该方案的特点是不需要秘密分发者事先给每个用户分发 一个子秘密.不需要安全信道传输信息,而且所有的中间信息都是不需要保密的-This paper proposes a new threshold multi-secret sharing scheme which is based on ECC.Th e scheme didn’t need give any secret inform ation to all users an
Coria-2008-A-Video-Watermarking-Scheme
- A video watermarking scheme