搜索资源列表
希尔
- 不错的希尔代码,希尔是一种经典的加密算法,加密可以通过一线形变换,脱密再做依次逆变换。密钥就是变换矩阵本身。-good code Hill, Hill is a classic encryption algorithms, encryption can transform line shape, followed again from close inverse transform. Key is the transformation matrix itself.
mega16做的4*5矩阵按键程序
- mega16做的4*5矩阵按键程序,键值送至1602液晶显示,同时更新了proteus仿真,可在不搭建硬件平台的基础上实现调试及仿真,-mega16 do 4* 5 matrix key program, key sent to the LCD 1602, and updated the proteus simulation, you can not build a hardware platform based on the debugging and simulation,
PlayfairCipher_codes
- Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854
df1eadec-0ecc-477f-b197-3714c411c687
- 独立按键控制,一直以来,独立式按键是一块问题,矩阵键盘也是,希望可以给你带来启发-Independent key control, has been key is a stand-alone issue, the keyboard matrix is also the hope that can give you inspiration
AnImageEncryptionSchemeBasedonChaoticMap
- ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomp
ASM
- 按键扫描程序 ASM。1. 键盘采用4*5矩阵键盘,含有两个组合键. 2. 硬件连接比较混乱,且各个按键的排列与面贴上的键码对应混乱.如果采用教科书上常规矩阵键盘的 扫描方式实现比较繁琐. 3. 需要识别两个双键,但这两个双键位置比较特殊K17,K18和K19,K20. 4. 基于2,3两点.这里采用列,行分别输出全零,读取行,列的引脚电平信息.综合这两组信息查表获取键值. 对于单键按下,有两个位为0.对于两个按键按下,有3或4个位为0. -Key scanne
linuxkeyboard
- 基于s3c2440和linux,实现了3*4的矩阵键盘驱动。 功能:延时消抖,重复按键,多键齐按-S3c2440 and based on linux, a 3* 4 matrix keyboard driver. Function: debounce delay, repeat button, multi-key together by
aes_key_expand_128
- The key expansion function takes the user supplied 16 bytes long key and utilizes the previously created round constant matrix rcon and the substitution table s_box to generate a 176 byte long key schedule w, which will be used during the en- and
AES
- AES加密过程是在一个4×4的字节矩阵上运作,这个矩阵又称为“体(state)”,其初值就是一个明文区块(矩阵中一个元素大小就是明文区块中的一个Byte)。(Rijndael加密法因支持更大的区块,其矩阵行数可视情况增加)加密时,各轮AES加密循环(除最后一轮外)均包含4个步骤: 1.AddRoundKey — 矩阵中的每一个字节都与该次回合金钥(round key)做XOR运算;每个子密钥由密钥生成方案产生。 2.SubBytes — 通过一个非线性的替换函数,用查找表的方式把每个
arm9-key-code
- 这个程序是用在arm板 linux 驱动开发。功能是矩阵按键的驱动,在很多智能系统中都有涉及,这个文档介绍了设计思想。-This procedure is used in the arm plate linux driver development. Function keys matrix driver, in many intelligent systems are involved, this document describes the design concept.
hid-picolcd_core
- The PicoLCD has an IR receiver header, a built-in keypad with 5 keys and header for 4x4 key matrix. The built-in keys are part of the matrix.
Cipher
- 置换密码算法的原理是不改变明文字符,只将字符在明文中的排列顺序改变,从而实现明文信息的加密。置换密码也叫换位密码。 试编程实现矩阵换位密码。它的加密方法是将明文中的字母按照给定的顺序安排在一个矩阵中,然后用根据密钥提供的顺序重新组合矩阵中的字母,形成密文。例如,明文为attack begins at five,密钥为cipher,将明文按照每行6个字母的形式排在矩阵中,如下形式: a t t a c k b e g i n s a t f i v e 根据密钥ciphe
