搜索资源列表
dess.zip
- Fast DES kit - Phil Karn, KA9Q September 2, 1994 This archive includes optimized DES code in portable C, Borland inline assembler for the 386, and GNU 'as' format assembler for the 386. Contents: readme - this file readme.des - details on
loki加密算法C语言源代码
- loki加密算法 /* This is an independent implementation of the encryption algorithm: */ /* */ /* LOKI97 by Brown and Pieprzyk */ /*
File_Handler
- 这个类提供了一个快速和更简单的方式来使用RC4算法来加密和解密文件。它也包括了用来打开,读取,编写和附加文件的方法。包括了一个类的演示客户端程序。- This kind has provided fast and the simpler way uses the RC4 algorithm to encrypt reconciles the dense document. It also included has used for to open, reads takes, compilat
RSA的加密算法的应用DEMO
- RSA的加密算法的应用DEMO 也是用来加密的。-RSA encryption algorithm application DEMO also is uses for to encrypt.
register
- register 和decode 对就的注册机的源码,VC-register and decode to on registration machine source code, VC
RsaKit_V1[1].0
- RsaKit_V1[1].0 一个高手写的RSA算法的加密解密的源码,类封装的很好,代码清晰易懂。VC。-RsaKit_V1 [ 1 ] 0 a high hand-written RSA algorithm encryption decipher source code, kind of seal very good, the code clear is easy to understand. VC.
Jiemishuo
- 将密钥添加到文件尾部的例子- Increases the key to the document rear part example
codingit
- RSA加密解密 java编写-RSA encryption deciphers java to compile
A-PAINLESS-GUIDE-TO-CRC-ERROR-DETECTION-ALGORITHMS
- A PAINLESS GUIDE TO CRC ERROR DETECTION ALGORITHMS CRC校验理论与实践的经典教程,Ross写的。-A PAINLESS GUIDE TO CRC ERROR DETECTION ALGORITHMS CRC checksum of the classic theory and practice tutorials, Ross wrote.
hills
- I try to create GUI using Matlab to code hills polygraph cipher
rossler
- It is a code to simulate two Rossler oscilators, unidirectionally coupled and sincronized
steg1
- this program steganographs an image into another image. however the host and the specimen are image equivalents of audio signals which are rearranged to form an image. thus effectively it is audio steganography
lsbsoundsignal
- 最不 重 要 位(LSB)方法DO是将秘密数据(水印数据)嵌入到载体数据中最简单的一种方法,它是在时域里隐藏数据。任何的秘密数据都可以看作是一串二进制位流,而音频文件的每一个采样数据也是以二进制数来表示。这样,可以将部分采样值的最不重要位用代表秘密数据的二进制位替换掉,以达到在音频信号中嵌入秘密数据的目的。-The most significant bits (LSB) method of DO is the secret data (watermark data) embedded into
Introduction_to_modern_cryptography
- introduction to modern cryptography
RTL-to-Gates-Synthesis-using-Synopsys-Design-Comp
- RTL-to-Gates Synthesis using Synopsys Design Compiler.rar
PGP---An-Introduction-To-Cryptography
- Data that can be read and understood without any special measures is called plaintext or cleartext. The method of disguising plaintext in such a way as to hide its substance is called encryption. Encrypting plaintext results in unreadable gibbe
How-to-Share-a-Secret
- 如何实现分享一个秘密,利用秘密图像分享技术来实现加密。-How to Share a Secret。using Secret Image Sharing.
An-Introduction-to-Cryptography
- 加密基础,密码学介绍中文第二版(An Introduction to Cryptography)-Based encryption, cryptography introduces Chinese Second Edition (An Introduction to Cryptography)
Guide-to-Elliptic-Curve-Cryptography
- Guide to Elliptic Curve Cryptography
(ebook)---reference---An-Introduction-To-Cryptogr
- Cryptography is the stuff of spy novels and action comics. Kids once saved up bubble-gum wrappers and sent away for Captain Midnight’s Secret Decoder Ring. Almost everyone has seen a television show or movie involving a nondescr ipt suit-clad gentlem