Welcome![Sign In][Sign Up]
Location:
Search - des performance

Search list

[Crack Hackdesdecodec

Description: 通用的DES数据加密算法程序,C编写,加密性能高,目前广泛应用在产品设计上-common DES Data Encryption Algorithm, C, the high-performance encryption, widely used in product design
Platform: | Size: 24053 | Author: 陈名 | Hits:

[Crack Hackkcf_crypt_test

Description: It is an experimental testing for python M2Crypto module. M2Crypto is not well document. User may not know how to use SHA256 when signing and verify with RSA. It also have not enough document to show how to use DES to encrypt and decrypt. Here also includes source codes for performance evaluation of the algorithms. This experimental program explore all this issue and may be helpful for some one who using python for doing encryption with RSA and DES.
Platform: | Size: 11532 | Author: roberto guo | Hits:

[Crack Hackdesdecodec

Description: 通用的DES数据加密算法程序,C编写,加密性能高,目前广泛应用在产品设计上-common DES Data Encryption Algorithm, C, the high-performance encryption, widely used in product design
Platform: | Size: 23552 | Author: 陈名 | Hits:

[Crack Hackkcf_crypt_test

Description: It is an experimental testing for python M2Crypto module. M2Crypto is not well document. User may not know how to use SHA256 when signing and verify with RSA. It also have not enough document to show how to use DES to encrypt and decrypt. Here also includes source codes for performance evaluation of the algorithms. This experimental program explore all this issue and may be helpful for some one who using python for doing encryption with RSA and DES.
Platform: | Size: 11264 | Author: roberto guo | Hits:

[Crack HackyxyDES2_VC

Description: 尹学渊版的DES第二版,注释写得非常清楚,并且执行效率不错,代码质量相比第一版有很大的改进,尹学渊保留所有权利,转载自:http://www.cnblogs.com/erwin/-The second edition of YinXueyuan s DES code,the Notes is very clear, and good performance, code quality compared to a significant improvement over the first edition, All rights reserved.YinXueyuan, reprinted from: http://www.cnblogs.com/ erwin /
Platform: | Size: 15360 | Author: YinXueyuan | Hits:

[Windows DevelopKAES

Description: AES作为新一代的数据加密标准汇聚了强安全性、高性能、高效率、易用和灵活等优点。AES设计有三个密钥长度:128,192,256位,相对而言,AES的128密钥比DES的56密钥强1021倍。AES算法主要包括三个方面:轮变化、圈数和密钥扩展。-AES as a new generation of Data Encryption Standard security brings together strong, high performance, high efficiency, the advantages of easy-to-use and flexible. AES has three key design Length: 128192256, relatively speaking, AES 128-key keys than DES 56-fold strong 1021. AES algorithm mainly includes three aspects: round of changes in the number and key ring expansion.
Platform: | Size: 4096 | Author: Xu Enliang | Hits:

[OtherAuthentication

Description: Des tests de performance effectués sur différentes bases d’images nous permettent de conclure que cette méthode d’organisation et d’interrogation d’une base d’images représente une alternative intéressante aux méthodes basées sur l’utilisation de la similarité globale entre deux images dans un contexte de k-plus proches voisins. Nous présentons également un outil de visualisation et d’interrogation requête, appelé Topological Image Query (TIQ).
Platform: | Size: 4096 | Author: rach | Hits:

[SCMCDataLink

Description: Des tests de performance effectués sur différentes bases d’images nous permettent de conclure que cette méthode d’organisation et d’interrogation d’une base d’images représente une alternative intéressante aux méthodes basées sur l’utilisation de la similarité globale entre deux images dans un contexte de k-plus proches voisins. Nous présentons également un outil de visualisation et d’interrogation requête, appelé Topological Image Query (TIQ).
Platform: | Size: 3072 | Author: rach | Hits:

[CA authmydes

Description: 第一部分 数据加密标准DES (1)掌握DES中各加密函数对其性能影响; (2)DES的特性分析,包括互补性和弱密钥; (3)DES的实际应用,包括各种数据类型的加/脱密、DES的短块处理。 -The first part of the Data Encryption Standard DES (1) grasp the DES encryption function of each effect on its performance (2) DES characteristics analysis, including complementarity and weak keys (3) DES practical applications, including a variety of data types Add/off dense, DES short block processing.
Platform: | Size: 52224 | Author: scorpio | Hits:

[Crack HackNetBoxDex

Description: NetBoxDex v0.1 (NetBox 解包工具源码) NetBox 是一个全新概念的开发平台,它提供了业界最快速的用于开发 Internet 商业应用的开发和编译工具。NetBox 支持包括 JavaScript、VBScript、Perl 等目前应用最为广泛的脚本语言来构建功能强大和性能稳定的应用服务器、网络服务器以及 HTML-Based 网络多媒体桌面应用。NetBox 支持目前最为流行的 XML 和 Web Service 工业标准和 ASP、COM、.NET 等流行标准,NetBox 对第三方数据库的完美支持使您新构建的商务应用可以容易的将已有的应用系统整合进来,从而充分利用现有的 IT 资源,大大的节约投资。NetBox 提供的 SSL、TLS 安全协议、RSA、DES 等加密算法和独立于应用程序的虚拟机技术使您的数据得到最大限度的保护。NetBox 提供将应用部署到无线设备的能力。NetBox 提供将您的应用编译成独立可执行文件的能力,极大的加快运行速度和代码安全性。使用 NetBox 开发,大大提高了应用系统的可扩展性、稳定性和安全性。NetBox 的出现也首次让应用软件开发商能够如此快速和容易的构建完整的基于 Internet 强大应用。-NetBoxDex v0.1 (NetBox unpack tool source) NetBox is a new concept of development platform, which provides the industry s most rapid development of Internet business applications for the development and build tools. NetBox support including JavaScript, VBScript, Perl, etc. Currently the most widely used scripting language to build powerful and stable performance of application servers, Web servers and HTML-Based Network Multimedia desktop application. NetBox support the current most popular industry-standard XML and Web Service and ASP, COM,. NET and other popular standards, NetBox the perfect support for third-party database to build your new business applications can easily integrate to existing applications in, to make full use of existing IT resources, dramatically reduce investment. NetBox provided by SSL, TLS security protocols, RSA, DES and other encryption algorithms and application-independent virtual machine technology enables you to get maximum protection of data. NetBox w
Platform: | Size: 308224 | Author: 程光 | Hits:

[CA authTEA

Description: 本加密程序基于著名的TEA加密算法,密钥长度为128位,安全性高于DES算法(56位). 该算法安全、简洁、高效,加密解密速度极快,占用内存极少,非常适合于嵌入式系统 的加密解密,也能胜任大系统的安全性能要求。算法能防止常见的密码学攻击。 本程序中待加密的明文、加密生成的密文皆按64位数据分组进行加解密。 密钥长度128位,与AES、IDEA相当,从而确保足够的安全性。-The encryption program is based on the famous TEA encryption algorithm, key length 128 bits, safe in the DES algorithm (56). The algorithm safe, simple, efficient, fast encryption and decryption, occupy very little memory, very suitable for embedded systems encryption and decryption, also qualified for the safety of large-scale system performance requirements. Algorithm to prevent the common cryptographic attack. The procedure to be encrypted plaintext, encrypted ciphertext are carried out by a 64-bit data packet encryption and decryption. 128-bit key length, and AES, IDEA rather, to ensure adequate security.
Platform: | Size: 2048 | Author: YCLIU | Hits:

[Crack HackRSA

Description: RSA+DES混合文件加密 RSA算法是第一个能同时用于加密和数字签名的算法,也易于理解和操作。   RSA是被研究得最广泛的公钥算法,从提出到现在已近二十年,经历了各种攻击的考验,逐渐为人们接受,普遍认为是目前最优秀的公钥方案之一。RSA的安全性依赖于大数的因子分解,但并没有从理论上证明破译RSA的难度与大数分解难度等价。即RSA的重大缺陷是无法从理论上把握它的保密性能如何,而且密码学界多数人士倾向于因子分解不是NPC问题。 -Hybrid RSA+ DES File encryption RSA algorithm is the first can be used for both encryption and digital signature algorithms, but also easy to understand and operate. RSA is the most widely studied public key algorithm, which made nearly two decades now, through the various attacks the test, was gradually accepted, generally considered the best public key is one of the options. RSA' s security relies on the factorization of large numbers, but not theoretically prove the difficulty of deciphering the RSA and the difficulty of large integer equivalent. RSA' s major flaw is that in theory can not grasp how the performance of its security and passwords, many academics are not the NPC tends to factorization problems.
Platform: | Size: 112640 | Author: 王风 | Hits:

[Technology Managementa

Description: 阵元失效会破坏拖曳线列阵的幅相分布,导致阵列的旁瓣级出现明显升高,严重影响了阵列的性能。阵元失效条件下 的波束形成是一个非线性的最小平方的优化问题,对其直接求解非常困难。针对这一情况,提出了一种基于遗传算法的阵元 失效校准方法。算法的基本思想是将失效阵元的权重强制为零,并使得阵列的实际响应与期望响应在主瓣区域相匹配,同时 对阵列响应的旁瓣级作出限制-Failed elements will des仃oy the amplitude and phase distribution and yield an increase in the sidelobe level.It call seriously degrade the performance of art towed linear array.Beamforming in the presence of element failure can be seen as a non-linear least squares fitting question and the computations ale difficult.Aimming at this problem,an optimized method of element failure correction based on genetic algorithm is presented basic principle is to match the array response to a desired response over the mainlobe regions and minimize the weighted mean—square value of the response over the sidelobe regions.At the same time, weights offailed elements are forced to zero.Result ofthe simulation indicates that the method is feasible and effective.
Platform: | Size: 604160 | Author: 赵杰 | Hits:

[OtherExample-s5-1

Description:  “\Example-s5-1\des” 目录下为设计工程,其设计输入采用Synplify预先编译好的.vqm网表  “\Example-s5-1\source”目录下为设计的源代码,这里只给出了Verilog语言实例,仅供读者参考  “\Example-s5-1\source \area_opt”目录下为面积优化的代码  “\Example-s5-1\source \perf_opt”目录下为性能优化的代码 “\Example-s5-1\source \common”目录下是共用的代码-Under  \ Example-s5-1 \ des directory for design engineering, the design input using Synplify precompiled .vqm netlist  \ Example-s5-1 \ source directory for the design of the source code, just to give examples of Verilog language, reference work  \ Example-s5-1 \ source \ area_opt directory for the area-optimized code Under  \ Example-s5-1 \ source \ perf_opt directory for performance-optimized code Under the \ Example-s5-1 \ source \ common directory is shared code
Platform: | Size: 126976 | Author: zhuchaoyong | Hits:

[Otherdes_latest.tar

Description: 利用verilog实现的DES和3DES两种加密算法,其中每个算法又利用了两种实现方式,分别是面积优先和性能优先-Both use DES and 3DES encryption algorithms verilog implementation, which took advantage of each algorithm implemented in two ways, which are the priority and performance priority area
Platform: | Size: 41984 | Author: 程鹏 | Hits:

[OtherKDDTrain+

Description: KDD SET POUR UTILISATION POUR AMELIORER LES PERFORMANCE DES IDS
Platform: | Size: 1662976 | Author: abdelkaderm1000 | Hits:

CodeBus www.codebus.net