搜索资源列表
简易的矩陣加密編编码法
- 算法介绍 矩阵求逆在程序中很常见,主要应用于求Billboard矩阵。按照定义的计算方法乘法运算,严重影响了性能。在需要大量Billboard矩阵运算时,矩阵求逆的优化能极大提高性能。这里要介绍的矩阵求逆算法称为全选主元高斯-约旦法。 高斯-约旦法(全选主元)求逆的步骤如下: 首先,对于 k 从 0 到 n - 1 作如下几步: 从第 k 行、第 k 列开始的右下角子阵中选取绝对值最大的元素,并记住次元素所在的行号和列号,在通过行交换和列交换将它交换到主元素位
playfair
- playfair加密算法的实现,利用产生的矩阵去翻译解密.-PLAYFAIR encryption algorithm implementation, use the matrix to translate declassified.
desende
- 自己编的DES加密、解密算法,可实现windows下任何文件的加密、解密,尤其适用使用公用电脑而一些私人的文件不想被别人看到的情况,可设置八个字节的密钥,也就是每一位可以从0到255,这样对方就算已知置换矩阵和S盒的情况下用穷举法破解的难度也在2的32次幂,还是相当安全的。 加密:DESencrypt.exe 解密:DESdecrypt.exe-own addendum to the DES encryption, decryption algorithms can be realize
SquareCypher
- 矩阵加密算法:SquareCypher. c++实现 vs.net2005-Matrix Encryption Algorithm : SquareCypher. C achieve vs.net2005
intel+matrix
- intel+matrix详细功能
matrixssl-1-8-3-open
- matrix ssl代码,包括客户端和服务器端源程序,可以在vc.net2003上编译
希尔
- 不错的希尔代码,希尔是一种经典的加密算法,加密可以通过一线形变换,脱密再做依次逆变换。密钥就是变换矩阵本身。-good code Hill, Hill is a classic encryption algorithms, encryption can transform line shape, followed again from close inverse transform. Key is the transformation matrix itself.
HillCipher
- 自己编写的加密算法 hill加密算法。包括,hill数组的生成,hill数组矩阵的计算。-prepare their encryption algorithms hill encryption algorithm. Include hill array of generation, hill array matrix calculations.
NewalgorithmrequiringnopreprocessingforwidebandDOA
- 这是一篇讲述宽带信号DOA估计时一种不需要预估角度的聚焦矩阵的估计算法-This is a broadband signal on the DOA estimates do not need to forecast a focal point of the estimation algorithm matrix
shujujiegou
- 数据结构中螺旋矩阵、报数问题、进制转换、文本加密解密-Spiral data structure matrix, the number of reported problems, hexadecimal conversion, text encryption and decryption
matrix-tan.tar
- Matrixssl实现在传输层的加解密,并且成功移植到Linux上,实现XP到linux安全通信-Matrixssl to achieve in the transport layer encryption, and successfully transplanted to Linux, to achieve secure communications XP to linux
df1eadec-0ecc-477f-b197-3714c411c687
- 独立按键控制,一直以来,独立式按键是一块问题,矩阵键盘也是,希望可以给你带来启发-Independent key control, has been key is a stand-alone issue, the keyboard matrix is also the hope that can give you inspiration
AnImageEncryptionSchemeBasedonChaoticMap
- ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomp
juzhenjiami
- 一个简单的利用矩阵变换来进行加密的小程序。利用JAVA实现。-The use of a simple matrix transformation to carry out encrypted applet. The use of JAVA implementation.
IDEA
- Markov密码的(差分链)转移概率矩阵是双随机矩阵,其第二大(模)特征值对于确定Markov密码必要的迭代轮数有重要价值。该程序由本人编写,实现了求IDEA密码的缩小模型IDEA(8)的转移概率矩阵П0第二大(模)特征值-Markov password (differential chain) transition probability matrix is a doubly stochastic matrix, its second largest (modulus) eigenvalue
makeParityChk
- make parity matrix in matlab
soundsignal
- 将声音文件在时间轴上分割成几段,分别将段的秩序及某些段内的秩序颠倒,从而实现了对声音文件的加密。首先,先读取一个声音信号,对信号做1024点FFT变换,取完点之后,分成四个向量,四个向量组成一个矩阵,再对每一个向量进行转置,再重新整合,从而就实现了回密的过程。-Sound files on the timeline will be divided into paragraphs, each paragraph of the order and reversed the order of some
manuscript
- of impulses are studied: the impulses are input disturbances the impulses are ``neutral type, that is, they are neither helpful for stability of neural networks nor destabilizing and the impulses are stabilizing. For each type of impulses, b
SourceCoding(Huffman)
- Program to code or decode using Huffmann. Also the matrix and intermediate values are printed
nijuzhen
- 任意逆矩阵程序算法,可以对通信数据加密,保密性好。-Inverse matrix algorithm any program that can encrypt the communication data, privacy is good.