Welcome![Sign In][Sign Up]
Location:
Search - image rsa

Search list

[Crack Hackrsa

Description: RSA加密/解密算法实现源码与例子 -The source code and examples of implement of RAS encryption and decryption algorithm
Platform: | Size: 18432 | Author: 站长 | Hits:

[Crack Hackrsa

Description: 本程序实现了用RSA加密算法加密、解密图片。本程序仅作为RSA原理理解,所以没有实现大数运算部分,RSA选取n为15~16位,加密图片不要选太大,否则会很慢。-This procedure achieved the RSA encryption algorithm with encryption, decryption picture. This procedure only as a principle of understanding of RSA, there is no part of the realization of large numbers computing, RSA select n to 15 ~ 16, encryption, image and not too much, otherwise they will be very slow.
Platform: | Size: 3072 | Author: 涂进 | Hits:

[Crack HackRSA

Description: RSA加密解密BMP图象,并用pollord算法对其进行分析,能够成功加密图象-RSA encryption and decryption BMP images, and pollord analysis algorithm to be successful in image encryption
Platform: | Size: 112640 | Author: qq11420 | Hits:

[Crack HackRSAPK

Description: RSA公钥加解密算法源码,VC++语言开发, 可生成最长1024比特密钥对,里面包含大数运算类,可直接移植使用。-RSA public key encryption algorithm source code, VC++ Language development, can generate up to 1024 bit key pair, which contains large numbers computing categories, can be directly transplanted to use.
Platform: | Size: 20480 | Author: 曹鹏 | Hits:

[Crack Hackupload3

Description: Contains Rsa and program for magnification of a small image.
Platform: | Size: 3072 | Author: Allen Joseph R | Hits:

[Crack HackRSA_with_image

Description: make a RSA key from image or picture
Platform: | Size: 338944 | Author: hermanka | Hits:

[Multimedia programENDcryptageRSAimage

Description: end cryptage image rsa
Platform: | Size: 64512 | Author: CR07 | Hits:

[Algorithmalgorithm

Description: DES算法 DSA算法 ElGamal算法 Kohonen的SOFM(自组织特征映射) LAM(线性联想记忆)算法 LZW 压缩算法 MD5算法 PGP的安全性(一) PKCS #7 RSA算法 SSL是怎样工作的? Ternary Search Trees 产生组合的非递归算法 大整数的乘法 对LZW算法的改进及其在图象无损压缩中的应用 复数快速傅立叶变换算法 加密算法与密钥管理 经典加密算法在VB中的实现(1)- Rsa 经典加密算法在VB中的实现(2)- MD5 经典加密算法在VB中的实现(3)- RC4 经典加密算法在VB中的实现(4)- DES 经典字符串HASH函数测试 离散的Hopfield算法 秘密天窗加密方法C++源程序 浅谈图像压缩算法 求全排列的非递归算法 如何实现DES算法 神经元网络 LVQ(学习矢量量化)算法 神经元网络的经典B-P算法1 神经元网络的经典B-P算法2 神经元网络的经典B-P算法3 实数快速fft变换算法 实数快速fft算法二 使用ASP加密算法加密你的数据 手写体数据变换成像素位图的算法 -DES algorithm DSA algorithm ElGamal algorithm Kohonen s SOFM (Self Organizing Map) LAM (Linear Associative Memory) algorithm LZW compression algorithm MD5 Algorithm PGP Security (a) PKCS# 7 RSA algorithm SSL How does it work? Ternary Search Trees Produce combinations of non-recursive algorithm Large integer multiplication On the LZW algorithm and its application in image lossless compression Complex fast Fourier transform algorithm Encryption and Key Management Classical encryption algorithm implementation in VB in (1)- Rsa Classical encryption algorithm implementation in VB in (2)- MD5 Classical encryption algorithm implementation in VB in (3)- RC4 Classical encryption algorithm implementation in VB in (4)- DES Classical string HASH function test Discrete Hopfield algorithm Secret Window encryption C++ source code Of image compression algorithm Perfectionist ordered non-recursive algorithm How to implement DES algorithm Neural network LVQ (learning vector qu
Platform: | Size: 209920 | Author: 蟲子 | Hits:

[Crack HackRSA

Description: 运用java技术,基于RSA算法,实现对图片文件进行加密解密的源代码-Using java technology, based on RSA algorithm, the image files on the source code for encryption and decryption
Platform: | Size: 2048 | Author: 窦小敏 | Hits:

[OtherRSA

Description: very usefull code regarding the rsa algorithm in image processing.
Platform: | Size: 2048 | Author: siddharth | Hits:

[CA authDecrypt.rar

Description: 加密的几种常用的源码包,应用于数据库表部分字段的加密,图象文件等文档加密,双方通信时数据加密传输防他人网络截取信息。非对称RSA或ECC公钥加密私钥解密或者可用于数字签名 对称加密AES或者DES,56位的DES加密,128位或192位或256位AES加解密通常可设随便的密码长度,其它位用常字符代替;非对称加密多要先因式分解,对称加密多就移位处理。,Several common source package encryption, encryption, image files, and other document encryption applied to the part of the field of the database table, the two sides communicate data encryption transmission Anti others network interception. The asymmetric RSA or ECC public key to encrypt the private key to decrypt or can be used for digital signatures symmetric encryption AES or DES, 56-bit DES encryption, 128-bit or 192-bit or 256-bit AES encryption and decryption usually can be set casually password length, other bits instead of using the regular characters asymmetric encryption first multi factorization, symmetric encryption shift process.
Platform: | Size: 212992 | Author: 曾祥园 | Hits:

[CA authRSA

Description: RSA加密代码,可实现图像加密,应用于加密文件中-RSA encryption code, image encryption, can be realized and applied to the encrypted file
Platform: | Size: 1024 | Author: 刘富 | Hits:

[CA authRSA-encryption-image

Description: 基于RSA对图像进行加密,能够把图像文件获取并使之加密。-Image based on the RSA encryption, image files to obtain and encryption.
Platform: | Size: 6144 | Author: 杨光进 | Hits:

[Crack HackSymmetric-key-cryptography

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程; -Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the
Platform: | Size: 45056 | Author: 丁元元 | Hits:

[Crack HackRSA-Symmetric-key

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程;-Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the
Platform: | Size: 15360 | Author: 丁元元 | Hits:

[Delphi VCLRSA

Description: 生成图像垂直交错显示特效,Delphi编程学习源码,很好的参考资料。-Generating an image vertically interlaced display effects, Delphi programming learning source, a good reference.
Platform: | Size: 61440 | Author: 王堃 | Hits:

[Crack Hackrsa

Description: The file contains code for hiding text in an image file.
Platform: | Size: 1024 | Author: Dibyendu Samanta | Hits:

[CSharpsecret

Description: 本资料主要实现了文字图像的加解密,主要应用的算法有五种,分别是DES,AES,RSA,ECC,MD5,其中椭圆离散曲线加密算法较难。-This information is mainly to achieve the text image encryption and decryption, mainly used the algorithm has five, respectively is the DES, AES, RSA, ECC, MD5, which discrete elliptic curve encryption algorithm is more difficult.
Platform: | Size: 133120 | Author: 贺魄 | Hits:

[Special EffectsUntitled3

Description: matlab实现RSA对图像进行加密(自己手动生成公钥,私钥,按照像素进行加解密)-matlab to achieve the image RSA encryption (to manually generate a public key, private key, according to the pixel encryption and decryption)
Platform: | Size: 1024 | Author: 刘丹丹 | Hits:

[Crack HackCrypto_Steganography-master

Description: C# project integrating RSA enciphering and concealing the message in QR code/Image.
Platform: | Size: 122880 | Author: rainI7 | Hits:
« 12 »

CodeBus www.codebus.net