Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key Matrix 1.a 5X5 matrix of letters based on a keyword 2.fill in letters of keyword (sans duplicates) 3.fill rest of matrix with other letters Encrypting and Decrypting -plaintext is encrypted two letters at a time 1. if a pair is a repeated letter, insert filler like X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair
标签: monoalphabetic Playfair provides security
上传时间: 2017-05-25
上传用户:变形金刚
This is pthread c++ wrapper class. Developer can easily develop multithread programs with GNU C++ just like developing those modern languages (Java, Qt, C# ...).
标签: multithread Developer programs develop
上传时间: 2017-05-29
上传用户:royzhangsz
This is schematic and Gerber files of PCB that is used for GPS tracking device with GSM link. Scheme has many valuable schematic features, like protected digital and analog I/Os, power part adapted for car power supply, etc. Can be used as a reference design for anyone who wants to make own GPS GSM tracking system based on SIM508 module from Simcom.
标签: schematic tracking Gerber Scheme
上传时间: 2013-12-19
上传用户:chfanjiang
This is schematic and Gerber files of PCB that is used for GSM alarm system. This is industrial-grade system with many features like 1-wire (iButton) interface, additional interface for video camera (UART JPEG camera is used), SD card to store pictures from camera and send them by GSM to remote mobile phone. Can be used as a reference design for anyone who wants to make own GSM alarm system system based on SIM300C module from Simcom.
标签: This industrial-grad schematic is
上传时间: 2013-12-06
上传用户:com1com2
THis is a web framework that use to do text parsing and extraction and update the text extract in a notepad file into the website. Using Django and mysql.
标签: text extraction framework and
上传时间: 2013-12-25
上传用户:vodssv
In the last decade the processing of polygonal meshes has emerged as an active and very productive research area. This can basically be attributed to two developments: Modern geometry acquisition devices, like laser scanners and MRT, easily produce raw polygonal meshes of ever growing complexity Downstream applications like analysis tools (medical imaging), computer aided manufacturing, or numerical simulations all require high quality polygonal meshes as input. The need to bridge the gap between raw triangle soup data and high-quality polygon meshes has driven the research on ecient data structures and algorithms that directly operate on polygonal meshes rather than on a (most often not feasible) intermediate CAD representation.
标签: processing productive the polygonal
上传时间: 2017-06-03
上传用户:TF2015
This library implements the KLT Tracking algorithm [2004] for Feature Tracking in Video useful in computer vision tasks like object recognition, image indexing, tracking and structure from motion. This implementation uses programmable Graphics Hardware to achieve considerable speedup in the running time of the GPU-based implementation.
标签: Tracking implements algorithm Feature
上传时间: 2013-12-10
上传用户:trepb001
This library implements the KLT Tracking algorithm [2004] for Feature Tracking in Video useful in computer vision tasks like object recognition, image indexing, tracking and structure from motion. This implementation uses programmable Graphics Hardware to achieve considerable speedup in the running time of the GPU-based implementation.
标签: Tracking implements algorithm Feature
上传时间: 2013-12-19
上传用户:WMC_geophy
一个用java做的记事本小程序,在Windows下的Notepad下加了某些功能
上传时间: 2013-12-25
上传用户:lht618
VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.
标签: implementation twofish cipher VHDL
上传时间: 2017-06-25
上传用户:王小奇