搜索资源列表
gtea
- Based on the key material generated 3584 Round table of the sample plug and a length of 256 x kb. Key schedule includes pre-encryption round key encryption procedure. Encryption is technology-dependent data permutations, sampling subkey for subblock
libcartman_2ddp3
- The source code of the implementation of a symmetric cryptographic algorithm block Cartman-2DDP3 language Pascal / Delphi. The algorithm processes the blocks of 128-bits. The default key size is 512 bits, allowed 256 and 384 bit keys. For 512 b
g_tea
- Based on the key material generated 3584 Round table of the sample plug and a length of 256 x kb. Key schedule includes pre-encryption round key encryption procedure. Encryption is technology-dependent data permutations, sampling subkey for subblock
cryptography
- Richard Spillman著,第一部分介绍了密码学的经典问题,第二部分介绍了现代密码学,包括流加密法,块加密法和公共密钥加密法,第三部分介绍了密码学的未来,并对量子加密法进行了简单介绍 -Richard Spillman zhao, the first part introduces the classic question of cryptography, the second part presents a modern cryptography, including flow e
kairakan
- KAIRAKAN - 32-bit version of the Skipjack encryption algorithm with 256 bit key, extended to 8 times SBOX, further transformation of the sub-blocks.
hsm
- Hsm Atalla Hardware Security Module (HSM) that is used by banks and processors for cryptographic operations, such as verifying/translating PIN blocks, authorising transactions by verifying CVV/CSC numbers
zishiyingjiami
- 为了提高图像加密算法的鲁棒性,提出了一种新的自适应图像加密算法。首先,把任意大小的灰度或彩 色图像分成2 × 2 子块 然后,用左上角子块的像素灰度值和Chebyshev 混沌映射构造与右上角子块等大的矩阵,用该 矩阵对右上角子块进行像素灰度值替换 最后,按顺时针对每个子块进行加密,直到左上角子块加密完毕。该算法不 依赖于图像的大小,而且适用于灰度图像和彩色图像,因而有很强的鲁棒性。同时灰度值扩散机制的引入使得该算 法具有良好的扩散性和扰乱性。-This paper presen
MerkleHellman
- The encryption algorithm using Merkle-Hellman knapsacks starts with a binary message. * The message is envisioned as a binary sequence P = [p1, p2, … ,pk]. * Divide the message into blocks of m bits, Po = [P1, P2, ... ,Pm], P1 = [Pm+1, .