Location:
Search - image rsa
Search list
Description: RSA加密/解密算法实现源码与例子 -The source code and examples of implement of RAS encryption and decryption algorithm
Platform: |
Size: 18432 |
Author: 站长 |
Hits:
Description: 本程序实现了用RSA加密算法加密、解密图片。本程序仅作为RSA原理理解,所以没有实现大数运算部分,RSA选取n为15~16位,加密图片不要选太大,否则会很慢。-This procedure achieved the RSA encryption algorithm with encryption, decryption picture. This procedure only as a principle of understanding of RSA, there is no part of the realization of large numbers computing, RSA select n to 15 ~ 16, encryption, image and not too much, otherwise they will be very slow.
Platform: |
Size: 3072 |
Author: 涂进 |
Hits:
Description: RSA加密解密BMP图象,并用pollord算法对其进行分析,能够成功加密图象-RSA encryption and decryption BMP images, and pollord analysis algorithm to be successful in image encryption
Platform: |
Size: 112640 |
Author: qq11420 |
Hits:
Description: RSA公钥加解密算法源码,VC++语言开发, 可生成最长1024比特密钥对,里面包含大数运算类,可直接移植使用。-RSA public key encryption algorithm source code, VC++ Language development, can generate up to 1024 bit key pair, which contains large numbers computing categories, can be directly transplanted to use.
Platform: |
Size: 20480 |
Author: 曹鹏 |
Hits:
Description: Contains Rsa and program for magnification of a small image.
Platform: |
Size: 3072 |
Author: Allen Joseph R |
Hits:
Description: make a RSA key from image or picture
Platform: |
Size: 338944 |
Author: hermanka |
Hits:
Description: end cryptage image rsa
Platform: |
Size: 64512 |
Author: CR07 |
Hits:
Description: DES算法
DSA算法
ElGamal算法
Kohonen的SOFM(自组织特征映射)
LAM(线性联想记忆)算法
LZW 压缩算法
MD5算法
PGP的安全性(一)
PKCS #7
RSA算法
SSL是怎样工作的?
Ternary Search Trees
产生组合的非递归算法
大整数的乘法
对LZW算法的改进及其在图象无损压缩中的应用
复数快速傅立叶变换算法
加密算法与密钥管理
经典加密算法在VB中的实现(1)- Rsa
经典加密算法在VB中的实现(2)- MD5
经典加密算法在VB中的实现(3)- RC4
经典加密算法在VB中的实现(4)- DES
经典字符串HASH函数测试
离散的Hopfield算法
秘密天窗加密方法C++源程序
浅谈图像压缩算法
求全排列的非递归算法
如何实现DES算法
神经元网络 LVQ(学习矢量量化)算法
神经元网络的经典B-P算法1
神经元网络的经典B-P算法2
神经元网络的经典B-P算法3
实数快速fft变换算法
实数快速fft算法二
使用ASP加密算法加密你的数据
手写体数据变换成像素位图的算法
-DES algorithm
DSA algorithm
ElGamal algorithm
Kohonen s SOFM (Self Organizing Map)
LAM (Linear Associative Memory) algorithm
LZW compression algorithm
MD5 Algorithm
PGP Security (a)
PKCS# 7
RSA algorithm
SSL How does it work?
Ternary Search Trees
Produce combinations of non-recursive algorithm
Large integer multiplication
On the LZW algorithm and its application in image lossless compression
Complex fast Fourier transform algorithm
Encryption and Key Management
Classical encryption algorithm implementation in VB in (1)- Rsa
Classical encryption algorithm implementation in VB in (2)- MD5
Classical encryption algorithm implementation in VB in (3)- RC4
Classical encryption algorithm implementation in VB in (4)- DES
Classical string HASH function test
Discrete Hopfield algorithm
Secret Window encryption C++ source code
Of image compression algorithm
Perfectionist ordered non-recursive algorithm
How to implement DES algorithm
Neural network LVQ (learning vector qu
Platform: |
Size: 209920 |
Author: 蟲子 |
Hits:
Description: 运用java技术,基于RSA算法,实现对图片文件进行加密解密的源代码-Using java technology, based on RSA algorithm, the image files on the source code for encryption and decryption
Platform: |
Size: 2048 |
Author: 窦小敏 |
Hits:
Description: very usefull code regarding the rsa algorithm in image processing.
Platform: |
Size: 2048 |
Author: siddharth |
Hits:
Description: 加密的几种常用的源码包,应用于数据库表部分字段的加密,图象文件等文档加密,双方通信时数据加密传输防他人网络截取信息。非对称RSA或ECC公钥加密私钥解密或者可用于数字签名 对称加密AES或者DES,56位的DES加密,128位或192位或256位AES加解密通常可设随便的密码长度,其它位用常字符代替;非对称加密多要先因式分解,对称加密多就移位处理。,Several common source package encryption, encryption, image files, and other document encryption applied to the part of the field of the database table, the two sides communicate data encryption transmission Anti others network interception. The asymmetric RSA or ECC public key to encrypt the private key to decrypt or can be used for digital signatures symmetric encryption AES or DES, 56-bit DES encryption, 128-bit or 192-bit or 256-bit AES encryption and decryption usually can be set casually password length, other bits instead of using the regular characters asymmetric encryption first multi factorization, symmetric encryption shift process.
Platform: |
Size: 212992 |
Author: 曾祥园 |
Hits:
Description: RSA加密代码,可实现图像加密,应用于加密文件中-RSA encryption code, image encryption, can be realized and applied to the encrypted file
Platform: |
Size: 1024 |
Author: 刘富 |
Hits:
Description: 基于RSA对图像进行加密,能够把图像文件获取并使之加密。-Image based on the RSA encryption, image files to obtain and encryption.
Platform: |
Size: 6144 |
Author: 杨光进 |
Hits:
Description: 完成基于非对称密码技术的对称密钥分配工作
说明:
(1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。
(2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2;
(3)对比T1和T2;
要求:
(1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持);
(2)通信内容为一图象文件(test_pic.bmp);
(3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上);
(4)所分配的对称密钥皆为一次一密,随机产生;
(5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程;
-Completed based on asymmetric cryptography symmetric key distribution work
Description:
( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work .
(2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2
( 3 ) comparing T1 and T2
Requirements:
(1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported )
( 2) The content of the communication is an image file (test_pic.bmp)
( 3 ) complete network-based key distribution job ( as the
Platform: |
Size: 45056 |
Author: 丁元元 |
Hits:
Description: 完成基于非对称密码技术的对称密钥分配工作
说明:
(1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。
(2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2;
(3)对比T1和T2;
要求:
(1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持);
(2)通信内容为一图象文件(test_pic.bmp);
(3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上);
(4)所分配的对称密钥皆为一次一密,随机产生;
(5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程;-Completed based on asymmetric cryptography symmetric key distribution work
Description:
( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work .
(2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2
( 3 ) comparing T1 and T2
Requirements:
(1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported )
( 2) The content of the communication is an image file (test_pic.bmp)
( 3 ) complete network-based key distribution job ( as the
Platform: |
Size: 15360 |
Author: 丁元元 |
Hits:
Description: 生成图像垂直交错显示特效,Delphi编程学习源码,很好的参考资料。-Generating an image vertically interlaced display effects, Delphi programming learning source, a good reference.
Platform: |
Size: 61440 |
Author: 王堃 |
Hits:
Description: The file contains code for hiding text in an image file.
Platform: |
Size: 1024 |
Author: Dibyendu Samanta |
Hits:
Description: 本资料主要实现了文字图像的加解密,主要应用的算法有五种,分别是DES,AES,RSA,ECC,MD5,其中椭圆离散曲线加密算法较难。-This information is mainly to achieve the text image encryption and decryption, mainly used the algorithm has five, respectively is the DES, AES, RSA, ECC, MD5, which discrete elliptic curve encryption algorithm is more difficult.
Platform: |
Size: 133120 |
Author: 贺魄 |
Hits:
Description: matlab实现RSA对图像进行加密(自己手动生成公钥,私钥,按照像素进行加解密)-matlab to achieve the image RSA encryption (to manually generate a public key, private key, according to the pixel encryption and decryption)
Platform: |
Size: 1024 |
Author: 刘丹丹 |
Hits:
Description: C# project integrating RSA enciphering and concealing the message in QR code/Image.
Platform: |
Size: 122880 |
Author: rainI7 |
Hits: