Welcome![Sign In][Sign Up]
Location:
Search - encryption hill

Search list

[Mathimatics-Numerical algorithms希尔排序

Description: 希尔排序-Sort Hill
Platform: | Size: 1024 | Author: 俞伟 | Hits:

[Crack Hack密码编码学——加密方法的C与C++实现

Description: 密码编码学——加密方法的C与C++实现-cryptographers-- encryption methods of achieving C and C
Platform: | Size: 9635840 | Author: wise | Hits:

[Crack Hack希尔

Description: 不错的希尔代码,希尔是一种经典的加密算法,加密可以通过一线形变换,脱密再做依次逆变换。密钥就是变换矩阵本身。-good code Hill, Hill is a classic encryption algorithms, encryption can transform line shape, followed again from close inverse transform. Key is the transformation matrix itself.
Platform: | Size: 2048 | Author: 李军 | Hits:

[Crack Hack一个产生程序序列号的方法

Description: 对软件进行加密限制,以防止末经诃可的随意拷贝-right software encryption restrictions to prevent the end by sending copies to be arbitrary
Platform: | Size: 69632 | Author: 卢本陶 | Hits:

[Crack HackHillCodor

Description: 在VC环境下采用希尔密码体制加密、解密和破译。该软件实现了输入任意长度的密钥对文件进行加密和解密,解密密钥和密文保存在文件中。如果有完整的明文和对应的密文可是实现破译功能,即得出加密密钥。-in VC environment with Hill cryptosystem encryption, decryption and decoding. The software arbitrary length of the input to the key document encryption and decryption, and the decryption key secret to preserve the text in the document. If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.
Platform: | Size: 4512768 | Author: | Hits:

[Crack Hackcryptology

Description: 实现了三种古典密码学体制和DES体制及其分析。affine(仿射)读入文件11.txt中内容(小写字母,明文)加密并把内容写入12.txt,还可以解密生成文件13.txt。vigenere,hill体制类似。DES体制包括加密解密雪崩效应差分分析等内容。由于本人还是刚学习程序设计语言及密码学的在校本科生,水平很低,第一次上传只是为了试一下。可以考虑少给几点,呵呵。-achieve three classical cryptography system and DES system and its analysis. P14 (affine) read into the document 11. Txt contents (lowercase letters, expressly) encryption and written 12. txt, can also generate documents declassified 13. txt. Vigenere, hill similar system. DES encryption and decryption system, including avalanche effect Differential analysis of the contents. Because I still just learning programming language and Cryptography in undergraduate school, the low level Uploading is the first to try. Consider a smaller number of points-huh.
Platform: | Size: 10240 | Author: 李栋 | Hits:

[Crack Hack300sunflower

Description: 300种加密解密的算法源代码, 在windows肯定能运行, 希望大家喜欢-300 encryption and decryption algorithm source code, the windows can certainly run, hope you like
Platform: | Size: 387072 | Author: | Hits:

[Crack HackHill_encpyt_decrypt_system

Description: 本源码是对Hill算法的简单实现,压缩包内包含crypt和decrypt两个目录,分别为加密和解密。-the source of Hill simple algorithm to achieve, Compression packet contains crypt and decrypt two catalogs, respectively encryption and decryption.
Platform: | Size: 5120 | Author: 张华 | Hits:

[Crack Hackhillmima

Description: 这是一个基于HILL密码的加密解密程序 能实现文本信息的加密(密钥可自行设定是一二阶矩阵)-HILL This is a password-based encryption and decryption process can realize text messaging encryption (key can be set on its own is a second-order matrix)
Platform: | Size: 1916928 | Author: sjm | Hits:

[OtherHILL

Description: 实现HILL密码的加密和解密,分三个题目详细说明。-HILL achieve password encryption and decryption, is divided into three topics in detail.
Platform: | Size: 10240 | Author: 宋明阳 | Hits:

[Crack Hacksecuritycode

Description: hill playfair vigenere 密码加密算法 (C++实现)-hill playfair vigenere password encryption algorithm (C++ achieve)
Platform: | Size: 22528 | Author: cpuno1111 | Hits:

[Crack HackHill

Description:
Platform: | Size: 1895424 | Author: mrmark | Hits:

[Crack HackHill

Description: Hill加密算法的基本思想是将l个明文字母通过线性变换将它们转换为k个密文字母。脱密只要做一次逆变换就可以了。密钥就是变换矩阵本身。即 M=m1m2……ml Ek(M)=c1c2……cl 其中 c1=k11m1+k12m2+……+k1lml c2=k21m1+k22m2+……+k2lml …… cl=kl1m1+kl2m2+……+kllml 通常对于字母加解密,使用mod 26的方法。 以上线性方程可以采用矩阵表示。 -Hill encryption algorithm the basic idea is to express the letter l a linear transformation through them is converted to k-secret alphabet. Off to do a secret as long as the inverse transform it. Key is the transformation matrix itself. That is, M = m1m2 ... ... mlEk (M) = c1c2 ... ... cl which c1 = k11m1+ K12m2+ ... ...+ K1lmlc2 = k21m1+ K22m2+ ... ...+ K2lml ... ... cl = kl1m1+ Kl2m2+ ... ...+ Kllml For encryption and decryption usually letters, use the method of mod 26. Above linear equations can be used express matrix.
Platform: | Size: 143360 | Author: wildkaede | Hits:

[Crack Hackhill

Description: 对称密码学体制中hill密码加密解密算法实现。-Symmetric cryptography system hill password encryption and decryption algorithm.
Platform: | Size: 27648 | Author: shine | Hits:

[matlabHill

Description: 数学建模实验&matlab实现Hill密码体系的关键环节(加密、解密、破译) 实现通用hill密码n维密码-Mathematical modeling of experimental realization of Hill & matlab key password system (encryption, decryption, decoding) to achieve universal hill n-password password
Platform: | Size: 11264 | Author: jk | Hits:

[matlabhill

Description:
Platform: | Size: 2048 | Author: 李锋 | Hits:

[Crack HackHill

Description: Hill密码加密与解密C++程序实现。 其中包括Hill2、Hill4等。(Implementation of Hill encryption and decryption C++ program.)
Platform: | Size: 2048 | Author: JackSkyLily | Hits:

[Crack Hackhill

Description: hill的加密解密代码,很牛的,你要相信我没错(Hill encryption and decryption code, very cattle, you have to believe I am right)
Platform: | Size: 14336 | Author: 654665995 | Hits:

[OtherHill

Description: hill密码加密用Java语言实现过程,很简单。(Hill password encryption using Java language to achieve the process is very simple.)
Platform: | Size: 4096 | Author: loading00 | Hits:

[Otherhill

Description: hill密码的加密算法实现,其中可以改变矩阵大小(Implementation of encryption algorithm for hill cipher)
Platform: | Size: 172032 | Author: 123点 | Hits:
« 12 3 4 »

CodeBus www.codebus.net