Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - encryption
Search - encryption - List
1.地址缩短,同时加密(更有利存取数据库之间的数据) 2.图片上传功能,使用了保密上传目录功能,就算被上传木马而不知道实际路径,木马就不起作用了,还有就是上传使用了会员积分上传,积分的数目由管理员在后台设置 3.图片使用了防盗链功能,外部连接图片也使用了简单的防盗功能,本地图片使用了流方式防盗链功能 4.增加了在线邮件发送功能,(该功能目前只应用两个地方,斑竹申请和举报贴吧,只要有会员提交了信息,系统会自动发提醒邮件给管理员,该功能可以在后台实现关闭或启用,要正常使用该功能,服务器必须安装jmail组件) 5.增加图片上传水印功能,(该功能可以在后台实现关闭或启用,同时可以在后台设置水印内容) 6.增加了随帖广告功能,无限量广告数目 7.后台管理员部分增加了多权限(注意:普通管理员只能访问部分管理页面) 8.增加了在后台设置管理后台地址,让你不用修改页面也能随意修改后台地址 -1. Address shortened, encryption (better access to data between databases) 2. Photo upload function, the use of confidentiality upload directory functions, even upload Trojans were not aware that the actual path, the Trojans would be ineffective, there is the use of Member Upload integral upload 3. 4.(Penny applications and affixed to report it, as long as a Member of the information submitted, the system will automatically remind mail to administrators, the functions can be achieved in the background closed or open to use the normal functions of the server components must be installed jmail) 5. Watermark increase picture upload function (which features) 6.
Date : 2025-12-23 Size : 1.38mb User : 冬儿

加解密入门级材料,内有多篇文章,一定会有帮助!-encryption entry-level material, there are more articles will be helpful!
Date : 2025-12-23 Size : 2.26mb User : hexin

2005年IEEE上的关于视频加密的论文-IEEE 2005 on the video encryption papers
Date : 2025-12-23 Size : 168kb User : 王军

ICPU卡基础知识:C卡从接口方式上分,可以分为接触式IC卡、非接触式IC卡及复合卡。从器件技术上分,可分为非加密存储卡、加密存储卡及CPU卡-ICPU card basic knowledge of: C interface card from the way points can be divided into contactless IC card, non-contact IC card and composite cards. From the technical sub-devices can be divided into non-encrypted memory card, encryption, memory card and CPU card
Date : 2025-12-23 Size : 14kb User : 韩慧

Advanced Encryption Standard
Date : 2025-12-23 Size : 239kb User : tagore

about encryption method of the quantom . this way is the new method for powerfull encrypting messages for security applets.
Date : 2025-12-23 Size : 834kb User : majid

encryption of images,files,notes
Date : 2025-12-23 Size : 1kb User : sumpungin

刘涛涛在2008中国软件安全技术峰会上演讲用的PPT,关于软件加解密的技术趋势,提出了一种新的软件加密方式——扭曲变换加密技术(内详)。-Liu Taotao security technology at the 2008 China Summit presentation software used in PPT, on software encryption and decryption technology trends, proposed a new software encryption method
Date : 2025-12-23 Size : 153kb User : 大黄

针对随机相位编码光学图像加密技术,简要回顾了它的国内外研究进展,并讨论了它的发展态势。-Research and progress of optical image encryption using random phase mask present research situation and development of image encryption using random phase mask at home and abroad are reviewed. At the same time, the trends of development is analyzed.
Date : 2025-12-23 Size : 314kb User : zhh

The amount of Implantable Medical Devices (IMD) keeps booming in recent years. However, not many of them have encryption and decryption methods to protect their data communication. The purpose of this thesis work is to profile various popular symmetric encryption algorithms and select the best candidates as the benchmark for generic IMD. Moreover, this thesis gives suggestions for design digital CPU for generic IMD based on lab work simulation output. This thesis work will focus on profiling and analyzing several metrics: average power consumption, peak power consumption and energy consumption of all candidates because those metrics are the crucial constraint of IMD. Also the background information of all candidates will be introduced and all relevant metrics such as security level, encryption rates of all candidates will be discussed in this thesis work.
Date : 2025-12-23 Size : 631kb User : namareq

摘 要: 1982年,Quisquate和Couvreur提出了一种RSA的变型算法,称为RSA–CRT算法,这是一种基于中国剩余定理的能够加速RSA解密的算法。1990年,Wiener提出了另外一种RSA的变型算法,称为重新平衡–RSA,进一步通过把解密成本转移到加密成本上来加速RSA解密。但是,因为公开指数e通常和RSA系数是同一量级,所以这种方法实质上最大化了加密时间。在本文中,我们介绍两种重新平衡–RSA变型算法,它们的公开指数e比模量更加的小,因此能够在保持较低解密成本的同时有效地减少加密成本。对于一个1024位的RSA模量,我们的第一种变型算法(方案A)的加密时间比原始的重新平衡–RSA算法的加密时间快至少2.6倍,而第二种变型算法(方案B)提供的加密时间至少比原来快3倍。在两种变型算法中,降低加密成本是以轻微地增加解密成本和增加核心生产成本为代价的。因此,这里提出的变型算法式是最适合应用在需要降低加密和解密成本的地方。关键字:RSA CRT 加密 数字签名 格基减化 密码分析学 -Abstract: In 1982, Quisquater and Couvreur proposed an RSA variant, called RSA-CRT, based on the Chinese Remainder Theorem to speed up RSA decryption. In 1990, Wiener suggested another RSA variant, called Rebalanced-RSA, which further speeds up RSA decryption by shifting decryption costs to encryption costs. However, this approach essentially maximizes the encryption time since the public exponent e is generally about the same order of magnitude as the RSA modulus. In this paper, we introduce two variants of Rebalanced-RSA in which the public exponent e is much smaller than the modulus, thus reducing the encryption costs, while still maintaining low decryption costs. For a 1024-bit RSA modulus, our fi rst variant (Scheme A) offers encryption times that are at least 2.6 times faster than that in the original Rebalanced-RSA, while the second variant (Scheme B) offers encryption times at least 3 times faster. In both variants, the decrease in encryption costs is obtained at the expe
Date : 2025-12-23 Size : 548kb User : huhui

Java cryptography resource is a nice resource for programming for encryption and decryption.
Date : 2025-12-23 Size : 390kb User : Amol/justamol

The Data Encryption Standard (DES) shall consist of the following Data Encryption Algorithm (DE S) and Triple Data Encryption Algorithm ( TDEA, as described in ANSI X9.52). These devices shall be designed in such a way that they may be used in a computer system or network to provide cryptographic protection to binary coded data. The method of implementation will depend on the application and environment. The devices shall be implemented in such a way that they may be tested and validated as accurately performing the transformations specified in the following algorithm s . -The Data Encryption Standard (DES) shall consist of the following Data Encryption Algorithm (DE S) and Triple Data Encryption Algorithm ( TDEA, as described in ANSI X9.52). These devices shall be designed in such a way that they may be used in a computer system or network to provide cryptographic protection to binary coded data. The method of implementation will depend on the application and environment. The devices shall be implemented in such a way that they may be tested and validated as accurately performing the transformations specified in the following algorithm s .
Date : 2025-12-23 Size : 196kb User : lyra

A Modified AES Based Algorithm for Image Encryption-A Modified AES Based Algorithm for Image Encryption...
Date : 2025-12-23 Size : 655kb User : Nikhil

scalable encryption algorithm
Date : 2025-12-23 Size : 7kb User : ekta

Signcryption is a new paradigm in public key cryptography that simultaneously fulfils both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by the traditional signature and encryption approach
Date : 2025-12-23 Size : 104kb User : kairazor

Encryption using genetic algorithms and cellular automata
Date : 2025-12-23 Size : 70kb User : j1368

1. 教你将秘密隐藏图片中[教材] 2. 一招绝技破解所有电脑的开机密码 3.. 不怕网管封 轻松修改网卡MAC地址 4.巧用网页实现万能解锁注册表方法 5.网站加密也没用 我想复制就复制 6.教你30秒钟破解所有密码 7. 无线上网不花钱的四招绝技 -Teach you the secrets hidden picture [textbook]. Stunt a move to crack all the computer' s boot password .. the not afraid Webmaster seal easily modify NIC MAC address. Clever use of the Web to achieve universal unlock registry method 5 website encryption the four strokes stunt useless I also want to copy to copy 6. teach you 30 seconds to crack all passwords 7 wireless Internet access at no cost
Date : 2025-12-23 Size : 14kb User : liuyan

ARM平台加密库的移植miracl比较经典的例子-The ARM platform encryption library transplant miracl classic example
Date : 2025-12-23 Size : 179kb User : zhuf.ge

Due to the unpredictability and complexity properties, chaotic maps are widely applied in security, com- munication, and system control. Existing one-dimensional (1D) chaotic maps can be easily predicted and high-dimensional (HD) ones have more complex structures and higher computation costs. In order to enhance the chaotic performance, this paper proposes a new two-dimensional infinite collapse map (2D- ICM). Compared with existing 2D chaotic maps, 2D-ICM has better ergodicity, hyperchaotic property, un- predictability, and a wider chaotic region. To investigate its application, we further propose an image encryption algorithm using 2D-ICM. Simulation demonstrates that the proposed image encryption algo- rithm has excellent performance for protecting various kinds of images.
Date : 2020-09-12 Size : 6.42mb User : zhedongtzdt@163.com
« 12 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.