Welcome![Sign In][Sign Up]
Location:
Search - Transposition

Search list

[Mathimatics-Numerical algorithms换位和工作安排

Description: 经典算法之换位和工作安排-classic algorithms transposition and organization of work
Platform: | Size: 2587 | Author: 常乐 | Hits:

[Windows Develop矩阵所有运算

Description: 矩阵的转置、行列式、秩,逆矩阵求法,矩阵的三角分解、qr分解,对称正定矩阵的乔里斯基分解及行列式值,奇异值分解,广义逆的奇异值分解,矩阵特征值与特征向量的各种计算方法-all kinds of computational method of transposition of matrix, determinant, rank, inverse of matrix,triangle decomposition, qr decomposition, cholesky decomposition and determinant value based on symmetry positive definite matrix, decomposition of singular value, decomposition of generalized inversal singular value, eigenvalue and eigenvector
Platform: | Size: 83488 | Author: 球球 | Hits:

[OtherWinRAR

Description: 这是一个最简单的换位密码,希望可以让大家工作之余,做喷饭之笑。-This is a simple transposition password, we can hope, must do double up with laughter laugh.
Platform: | Size: 31115 | Author: 刘明月 | Hits:

[assembly languageMatrix_Transposition_Multiplication

Description: Matrix Transposition and Multiplication It is a MIPS assembly program that does the following: given two matrices, M1 and M2, first transpose M2 to obtain M2tran. Then multiply M1 and M2tran.
Platform: | Size: 74640 | Author: Hong | Hits:

[Other resource换位法

Description: 这是硕士生计算机软件专业组合数学的一个换位法算法演示,仅供参考。-This is the master computer software professional combination of a mathematical algorithm law transposition demonstration purposes only.
Platform: | Size: 3819 | Author: 殷勤 | Hits:

[Mathimatics-Numerical algorithms换位和工作安排

Description: 经典算法之换位和工作安排-classic algorithms transposition and organization of work
Platform: | Size: 2048 | Author: 常乐 | Hits:

[Algorithm换位法

Description: 这是硕士生计算机软件专业组合数学的一个换位法算法演示,仅供参考。-This is the master computer software professional combination of a mathematical algorithm law transposition demonstration purposes only.
Platform: | Size: 3072 | Author: 殷勤 | Hits:

[Windows Develop矩阵所有运算

Description: 矩阵的转置、行列式、秩,逆矩阵求法,矩阵的三角分解、qr分解,对称正定矩阵的乔里斯基分解及行列式值,奇异值分解,广义逆的奇异值分解,矩阵特征值与特征向量的各种计算方法-all kinds of computational method of transposition of matrix, determinant, rank, inverse of matrix,triangle decomposition, qr decomposition, cholesky decomposition and determinant value based on symmetry positive definite matrix, decomposition of singular value, decomposition of generalized inversal singular value, eigenvalue and eigenvector
Platform: | Size: 82944 | Author: 球球 | Hits:

[Crack Hackywmm

Description: 一个简单的移位密码算法程序,可以实现移位加密和解密的功能,-A simple transposition cipher procedures, can shift realize encryption and decryption functions,
Platform: | Size: 268288 | Author: 王功臣 | Hits:

[Crack Hackzhihuan

Description: 置换密码算法的原理是不改变明文字符,只将字符在明文中的排列顺序改变,从而实现明文信息的加密。置换密码也叫换位密码。试编程实现矩阵换位密码。它的加密方法是将明文中的字母按照给定的顺序安排在一个矩阵中,然后用根据密钥提供的顺序重新组合矩阵中的字母,形成密文。-Permutation cipher does not change the principle is expressly characters, only characters in the explicit change in order to achieve explicit information encryption. Password replacement is also called transposition password. Programming test matrix transposition password. Its encryption method is to express the letter in accordance with the order given in a matrix, and then use the key provided in accordance with the order re-arrangement of the letters in the matrix to form a ciphertext.
Platform: | Size: 1024 | Author: rose | Hits:

[Crack Hacktraditionalcode

Description: 古典密码算法中的单表代换密码算法、移位密码算法、Vigenere密码算法。算法比较简单,用命令的方式。可以随机生成明文和密钥。-Classical cryptographic algorithm in a single table substitution cipher, transposition cipher, Vigenere cipher. Algorithm is relatively simple, way to use the command. Can be randomly generated and the key explicitly.
Platform: | Size: 2048 | Author: baichi123 | Hits:

[JSP/JavaTranspositions_java_security

Description: transposition algorithm developed here in java
Platform: | Size: 92160 | Author: cybercbm | Hits:

[Othertest

Description: 古典密码学若干算法 (1) 实现移位密码; (2) 实现替换密码; (3) 实现Vigenere密码(选做); (4) 实现置换密码(换位密码); (5) 对每一种密码,编写加密字符串和加密文件的两种算法并进行实验。 -A number of classical cryptography algorithm (1) the realization of shift cipher (2) to achieve the replacement of the password (3) the realization of Vigenere Password (elected to do) (4) the achievement of replacement password (password transposition) (5) of each passwords, encryption string and the preparation of the two algorithms to encrypt files and carry out such experiments.
Platform: | Size: 31744 | Author: 何何 | Hits:

[Crack Hackhuanwei

Description: VB加密换位算发,VB6调试通过-Transposition encryption algorithm VB
Platform: | Size: 2048 | Author: Mdx | Hits:

[OtherEncryption

Description: this program implements Substitution and Transposition cipher
Platform: | Size: 2048 | Author: Akshay | Hits:

[Windows DevelopVB.transposition.password.encryption.code.

Description: VB换位密码加密技术示例源代码VB transposition password encryption source code example-VB transposition password encryption source code example
Platform: | Size: 4096 | Author: 7zip | Hits:

[CA authTransposition.Ciphers

Description: A Program For Transposition Ciphers
Platform: | Size: 45056 | Author: Jerry | Hits:

[Crack HackTransposition.Ciphers

Description: This is a c++ program for Transposition ciphers.
Platform: | Size: 105472 | Author: Jerry | Hits:

[CA authImplementation-of-transposition-cipher

Description: Implementation of Transposition Cipher in C
Platform: | Size: 10240 | Author: | Hits:

[CA authtransposition

Description: In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed. Mathematically a bijective function is used on the characters positions to encrypt and an inverse function to decrypt.-In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed. Mathematically a bijective function is used on the characters positions to encrypt and an inverse function to decrypt.
Platform: | Size: 39936 | Author: pradeep | Hits:
« 12 3 4 5 6 7 8 »

CodeBus www.codebus.net