Welcome![Sign In][Sign Up]
Location:
Search - Hill

Search list

[Crack Hackclassic

Description: 古典密码 可选择进行维吉尼亚加解密、希尔加解密、行置换的乘积加解密、仿射加解密 并可选择下列统计计算: 1.不同n值下维吉尼亚密码体制的频率统计 2.不同n值下维吉尼亚密码体制的重合指数计算 3.不同n n值下希尔密码体制的频率统计 4.不同n n值下希尔密码体制的重合指数计算 5.不同(m,n,t)下维吉尼亚和行置换的乘积密码体制的频率统计 6.不同(m,n,t)下维吉尼亚和行置换的乘积密码体制的重合指数计算 7.对于同一明文,给出维吉尼亚密码体制、希尔密码体制、维吉尼亚和行置换的乘积密码体制、Rotor机的频率统计结果 -Virginia may choose to encrypt and decrypt, Gilgado decrypt, encrypt and decrypt the product line of replacement, affine encryption and decryption Can choose the following statistical computing: 1. Under different values of n the frequency of Statistics Virginia cryptosystem 2. Under different values of n coincide Virginia cryptography Index 3. Under different values of n  n Hill Cryptosystem frequency statistics 4. Under different values of n  n coincidence Hill cryptosystem Index 5. Different (m, n, t) under the Virginia and the replacement of the product line frequency statistics cryptosystem 6. Different (m, n, t) under the replacement of the product line of Virginia and the coincidence index calculation code system 7. For the same plaintext, given Virginia cryptosystem, cryptography Hill, Virginia, and the product code line replacement system, Rotor machine frequency statistics
Platform: | Size: 3072 | Author: Beaug | Hits:

[CommunicationIteratedHC

Description: optimization based on iterated hill climbing
Platform: | Size: 1024 | Author: sarah | Hits:

[Crack HackHill

Description: Hill Algorithm This system is based on linear algebra and has been important in the history of cryptography. It was invented by Lester S. Hill in 1929, and was the first polyalphabetic cryptographic system that was convenient to work with more than three symbols simultaneously.
Platform: | Size: 111616 | Author: galex | Hits:

[matlabhill

Description:
Platform: | Size: 2048 | Author: 李锋 | Hits:

[Otherhill

Description: maya mel语言创建山的代码 适合初学者学习-maya mel create a mountain of code language for beginners
Platform: | Size: 1024 | Author: cg | Hits:

[CA authislab

Description: this hill cipher, mona cipher, poly and play fair cipher technique in cryptography.it is used to encrypt multiple letters at a time.it is implemented in c++.at a time 1 or more than letters are encrypted and also can decrypted ..and runlength coding is also included .its is used for compressing the content-this is hill cipher, mona cipher, poly and play fair cipher technique in cryptography.it is used to encrypt multiple letters at a time.it is implemented in c++.at a time 1 or more than letters are encrypted and also can decrypted ..and runlength coding is also included .its is used for compressing the content
Platform: | Size: 4096 | Author: bobi | Hits:

[AlgorithmHill

Description: This file is about the Hill code s encoding and decoding. For the code worker, it may works.
Platform: | Size: 648192 | Author: xieshangxu | Hits:

[CA authHILLCIPH

Description: Hill cipher program attached
Platform: | Size: 1024 | Author: Siva | Hits:

[matlabpvmpptVhill

Description: mppt hill climbing with solar cill model
Platform: | Size: 13312 | Author: Ahmad | Hits:

[Crack HackHill

Description: HILL密码:加密,解密的实现及其相关功能-HILL Password: encryption, decryption and related functions to achieve
Platform: | Size: 2048 | Author: Lucifer | Hits:

[Crack HackHill

Description: hill 加密数学实验可以让学习者更快了解数学建模,并了解一般的实验步骤-for hill mask
Platform: | Size: 46080 | Author: luck | Hits:

[OtherMcGraw.Hill.Satellite.Communications.3rd.Editon.e

Description: McGraw.Hill.Satellite.Communications.3rd.Editon.eBook-TLFeBOOK, very impotent book for undergraduated and postgraduate level students wish you all the best and enjoy reading it
Platform: | Size: 3439616 | Author: lway | Hits:

[AI-NN-PRTema03

Description: Hill Climbing - an algorithm from genetic algorithms is in this package
Platform: | Size: 190464 | Author: monica1987is | Hits:

[Crack Hackhill

Description: 实现了希尔(hill)加密 n 维 加密 解密 破译功能-Achieved Hill (hill) to decrypt decipher the secret encryption function n Vega
Platform: | Size: 2048 | Author: 东荒冷羽 | Hits:

[CA authHillCipher

Description: hill cipher n/w security java program
Platform: | Size: 1024 | Author: saba | Hits:

[Data structsHill

Description: 希尔排序 学习数据结构很好的例子 注释很全-Hill sequential learning data structures are all good examples of comments
Platform: | Size: 8192 | Author: mailan7749 | Hits:

[CA authhill

Description: hill algorythm example. Just coding and no decoding.Not mine, just was a little bit changed.
Platform: | Size: 1024 | Author: constantinius | Hits:

[androidMcGraw.Hill.Android.A.Programmers.Guide.Jul.2008.

Description: for android developer, McGraw.Hill.Android.A.Programmers.Guide.Jul.2008.eBook-DDU.pdf
Platform: | Size: 4333568 | Author: king | Hits:

[JSP/JavaMc-Graw-Hill---SCJP-Sun-Certified-Programmer-for-

Description: Mc Graw Hill - SCJP Sun Certified Programmer for Java 6 Exam 310-065 (2008)
Platform: | Size: 2332672 | Author: Marcelo | Hits:

[Graph RecognizeMcGraw-Hill---Digital-Signal-Processing-(Schaums-

Description: McGraw-Hill - Digital Signal Processing (Schaum s Outlines, OCR) - 1999 - (By Laxxuss)
Platform: | Size: 6369280 | Author: Nguyen Khanh | Hits:
« 1 2 3 4 5 67 8 9 10 11 ... 50 »

CodeBus www.codebus.net