搜索资源列表
EncryDeCry
- 我在字符串加密时的处理是每次取字符串的三个字节,再把三个字符连成一个24位的整型,前8位存放第一个字符,中间8位存放第二个字符,最后8位存放第三个字符。再取这个整型数的前6位对应的数值去差用户提供对应表,转化成相应的字符,再取第二个6位,第三个6位,第四个六位进行字符的转换。再重复前面相同的操作值到整个字符串转换完毕。在解密的过程就是根据用户提供的表进行查找和移位换原字符串。 这种算法比通常的直接根据用户提供的表进行转换有更高的安全性,且加密解密的效率很高。-string encryptio
des.pl.26-11-91
- 是用的美国标准的DES加密算法用C++编写的可以完成以内的字符垢加密-the United States is using the DES encryption standard algorithm with C prepared to be completed within the characters scale encryption
DES3_TOP
- 3des10m性能优化设计代码,供加脱密适应,规模9000门-Performance Optimization 3des10m design code for the increase from Micronesia to adapt, scale 9000
RSA
- RSA公钥加密的基本实现 bmp灰度图片加解密操作包括 RSA 的加减密算法; 素数检测算法;RSA 密钥生成算法; 应用该 RSA 密码体制加、解密; BMP 灰度图的算法; Pollard p-1 算法 ; Pollard r 算法 ; -RSA public key encryption to achieve the basic gray-scale picture bmp including RSA encryption and decryption operations of addi
RSA_file_encryption
- 将公钥加密算法RSA应用于小型文件加密。将任意文件加密成文本的解决方案,使其使用更加灵活。-RSA public key encryption algorithm will be applied to small-scale file encryption. Arbitrary file encryption solution into the text to make it more flexible to use.
AlgorithmAnalysisAndProgramDesign
- 从低级到高级深入讲解当前实用计算机算法让你的学习更上一层楼-From lower to higher in-depth practical computer algorithms to explain the current study allows you to scale new heights
Encryption
- 不错加密库,可以运用到大型程序中,RSA等等,具体来源一个日本人的加密软件-Good encryption libraries, can be applied to large-scale program
22222222
- 密码攻防实战大演习,非常好的破解入门教程,以实例展开学习-Password offensive and defensive combat large-scale exercise, a very good break Tutorial, with examples to start learning
pdc_start
- 读取皮带秤软件 MB协议编写 CAR16加密 自动读取皮带秤程序-Read belt scale software
SpeededUpRobustFature
- This article presents a novel scale- and rotation-invariant detector and descr iptor, coined SURF (Speeded-Up Robust Features). SURF approximates or even outperforms previously proposed schemes with respect to repeatability, distinctiveness, and ro
Color-Extended-Visual-Cryptography-Using-Error-Di
- Color visual cryptography (VC) encrypts a color secret message into color halftone image shares. Previous methods in the literature show good results for black and white or gray scale VC schemes, however, they are not sufficient to be applied directl
Histogram_codes
- 基于直方图的水印嵌入和提取实现,各种水印攻击,如重抽样,加噪,滤波,尺度变换,局部裁剪-Based on the histogram of the watermark embedding and extraction to achieve a variety of watermark attacks, such as re sampling, noise, filtering, scale transform, local cropping
multi_scale_edge_detection
- design and Implementation process of the Multi Scale Fourier Transforms
