期刊文献+
共找到1,290篇文章
< 1 2 65 >
每页显示 20 50 100
Dynamically Reconfigurable Encryption System of the AES
1
作者 WANG Youren WANG Li YAO Rui ZHANG Zhai CUI Jiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1569-1572,共4页
Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption S... Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption Standard (AES) algorithm is widely applied in government department and commerce. This paper analyzed the AES algorithms with different cipher keys, adopted a novel key scheduler that generated the round key real-time, proposed a dynamically reconfigurable encryption system which supported the AES algorithm with different cipher keys, and designed the architecture of the reconfigurable system. The dynamically reconfigurable AES system had been realized on FPGA. The result proves that the reconfigurable AES system is flexible, lower cost and high security level. 展开更多
关键词 dynamically reconfigurable hardware field programmable gate array (FPGA) advanced encryption standard (AES) algorithm cipher key
下载PDF
Encryption and Decryption of Color Images through Random Disruption of Rows and Columns
2
作者 ZENG Jianhua ZHAN Yanlin YANG Jianrong 《Journal of Donghua University(English Edition)》 EI CAS 2020年第3期245-255,共11页
In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection o... In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection of information.Image encryption technology is a key technology for ensuring the security performance of images.We extracted single channel RGB component images from a color image using MATLAB programs,encrypted and decrypted the color images by randomly disrupting rows,columns and regions of the image.Combined with histograms and the visual judgments of encryption images,it is shown that the information of the original image cannot be obtained from the encryption image easily.The results show that the color-image encryptions with the algorithm we used have good effect and fast operation speed.Thus this algorithm has certain practical value. 展开更多
关键词 color image encryption decryption single channel RGB component image disrupting
下载PDF
Image Encryption and Decryption Based on Chaotic Algorithm
3
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos Algorithm Image encryption and decryption Two-Stage Logistic Mapping M Sequence
下载PDF
Image encryption based on a novel memristive chaotic system,Grain-128a algorithm and dynamic pixel masking
4
作者 HUANG Lilian SUN Yi +1 位作者 XIANG Jianhong WANG Linyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第3期534-550,共17页
In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov expon... In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov exponents.In particular,the system has robust chaos in a wide parameter range and the initial value space,which is favourable to the security communication application.Consequently,we further explore its application in image encryption and present a new scheme.Before image processing,the external key is protected by the Grain-128a algorithm and the initial values of the memristive system are updated with the plain image.We not only perform random pixel extraction and masking with the chaotic cipher,but also use them as control parameters for Brownian motion to obtain the permutation matrix.In addition,multiplication on the finite field GF(2^(8))is added to further enhance the cryptography.Finally,the simulation results verify that the proposed image encryption scheme has better performance and higher security,which can effectively resist various attacks. 展开更多
关键词 memristive chaotic system super-wide parameter range image encryption Grain-128a algorithm dynamic pixel masking
下载PDF
Novel dynamic anti-collusion ciphertext policy attribute-based encryption scheme in 5G D2D environment
5
作者 Xu Xiangjie Jiang Rui 《Journal of Southeast University(English Edition)》 EI CAS 2021年第3期251-257,共7页
To share data securely with secure attribute revocation,anti-collusion,and dynamic user management in the 5G device-to-device(D2D)environment,a novel dynamic anti-collusion ciphertext policy attribute-based encryption... To share data securely with secure attribute revocation,anti-collusion,and dynamic user management in the 5G device-to-device(D2D)environment,a novel dynamic anti-collusion ciphertext policy attribute-based encryption(NDA-CP-ABE)scheme in the 5G D2D environment is proposed.On the basis of the ciphertext policy attribute-based encryption algorithm,fine-grained access control and secure attribute revocation are realized,and the confidentiality of data is guaranteed.A polynomial function is adopted in the ciphertext generation phase to realize dynamic user management.A random number is used to prevent a collusion attack among the legitimate user equipment(UE),revoked UE,and external network attackers.Finally,on the basis of the Diffie-Hellman problem,the NDA-CP-ABE scheme is formally proved,and the simulation performances are compared with those of similar schemes.The results show that data can be securely shared through a D2D channel with secure attribute revocation,anti-collusion,and dynamic user management.Moreover,compared with similar schemes,the NDA-CP-ABE scheme has higher efficiency in encryption,decryption,and storage. 展开更多
关键词 device-to-device(D2D) attribute revocation user management dynamic anti-collusion ciphertext policy attribute-based encryption(NDA-CP-ABE) access control
下载PDF
Dynamic Encryption Technology in Ad-hoc Networks
6
作者 金朝晖 王顺满 +1 位作者 许楷 梁青 《Defence Technology(防务技术)》 SCIE EI CAS 2007年第3期221-225,共5页
A new dynamic encryption application in ad-hoc networks is proposed. The advantages of this method are its being able to use the previous ciphertext as a seed of a new encryption process, rendering the encryption proc... A new dynamic encryption application in ad-hoc networks is proposed. The advantages of this method are its being able to use the previous ciphertext as a seed of a new encryption process, rendering the encryption process effective in all communication process by continuous dynamic key generation together with synchronization, and its capability to cut back on system bandages to a greater extent, which is valuable for the ad-hoc circumstance. In addition, the rationality and effectiveness of this novel encryption method have been verified by the test results. 展开更多
关键词 通讯技术 动力编密码 对称形编密码 ad-hoc网
下载PDF
An Efficient Encrypted Speech Retrieval Based on Unsupervised Hashing and B+ Tree Dynamic Index
7
作者 Qiu-yu Zhang Yu-gui Jia +1 位作者 Fang-Peng Li Le-Tian Fan 《Computers, Materials & Continua》 SCIE EI 2023年第7期107-128,共22页
Existing speech retrieval systems are frequently confronted with expanding volumes of speech data.The dynamic updating strategy applied to construct the index can timely process to add or remove unnecessary speech dat... Existing speech retrieval systems are frequently confronted with expanding volumes of speech data.The dynamic updating strategy applied to construct the index can timely process to add or remove unnecessary speech data to meet users’real-time retrieval requirements.This study proposes an efficient method for retrieving encryption speech,using unsupervised deep hashing and B+ tree dynamic index,which avoid privacy leak-age of speech data and enhance the accuracy and efficiency of retrieval.The cloud’s encryption speech library is constructed by using the multi-threaded Dijk-Gentry-Halevi-Vaikuntanathan(DGHV)Fully Homomorphic Encryption(FHE)technique,which encrypts the original speech.In addition,this research employs Residual Neural Network18-Gated Recurrent Unit(ResNet18-GRU),which is used to learn the compact binary hash codes,store binary hash codes in the designed B+tree index table,and create a mapping relation of one to one between the binary hash codes and the corresponding encrypted speech.External B+tree index technology is applied to achieve dynamic index updating of the B+tree index table,thereby satisfying users’needs for real-time retrieval.The experimental results on THCHS-30 and TIMIT showed that the retrieval accuracy of the proposed method is more than 95.84%compared to the existing unsupervised hashing methods.The retrieval efficiency is greatly improved.Compared to the method of using hash index tables,and the speech data’s security is effectively guaranteed. 展开更多
关键词 encrypted speech retrieval unsupervised deep hashing learning to hash B+tree dynamic index DGHV fully homomorphic encryption
下载PDF
Digital image encryption with chaotic map lattices 被引量:8
8
作者 孙福艳 吕宗旺 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第4期132-138,共7页
This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels o... This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image. The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency. 展开更多
关键词 image encryption image decryption chaotic map lattice CRYPTOGRAPHY spatiotemporal chaotic system
下载PDF
A novel pseudo-random coupled LP spatiotemporal chaos and its application in image encryption 被引量:5
9
作者 Xingyuan Wang Yu Wang +2 位作者 Siwei Wang Yingqian Zhang Xiangjun Wu 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第11期419-429,共11页
In this paper, first, we investigate a novel one-dimensional logistic-PWLCM(LP) modulation map which is derived from the logistic and PWLCM maps. Second, we propose a novel PCLML spatiotemporal chaos in pseudo-rando... In this paper, first, we investigate a novel one-dimensional logistic-PWLCM(LP) modulation map which is derived from the logistic and PWLCM maps. Second, we propose a novel PCLML spatiotemporal chaos in pseudo-random coupling method that can accelerate the system behavior of the fully spatial chaos. Here, because the better chaotic properties include a wide range of parameter settings and better ergodicity than a logistic map, the LP is used in PCLML as f(x). The Kolmogorov–Sinai entropy density and universality and the bifurcation diagram are employed to investigate the chaotic behaviors of the proposed PCLML model. Finally, we apply the LP and PCLML chaotic systems to image encryption to improve the effectiveness and security of the encryption scheme. By combining self-generating matrix model M and dynamic substitution box(S-Box) methods, we design a new image encryption algorithm. Numerical simulations and security analysis have been carried out to demonstrate that the proposed algorithm has a high security level and can efficiently encrypt several different kinds of images into random-like images. 展开更多
关键词 logistic-PWLCM map PCLML spatiotemporal chaos matrix model M dynamic S-Box image encryption
下载PDF
Substring-searchable attribute-based encryption and its application for IoT devices 被引量:3
10
作者 Xi Sun Hao Wang +4 位作者 Xiu Fu Hong Qin Mei Jiang Likun Xue Xiaochao Wei 《Digital Communications and Networks》 SCIE CSCD 2021年第2期277-283,共7页
With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data lea... With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data leakage.A common method to prevent data leakage is to encrypt the data before uploading it,but the traditional encryption method is often not conducive to data sharing and querying.In this paper,a new kind of Attribute-Based Encryption(ABE)scheme,which is called the Sub-String Searchable ABE(SSS-ABE)scheme,is proposed for the sharing and querying of the encrypted data.In the SSS-ABE scheme,the data owner encrypts the data under an access structure,and only the data user who satisfies the access structure can query and decrypt it.The data user can make a substring query on the whole ciphertext without setting keywords in advance.In addition,the outsourcing method is also introduced to reduce the local computation of the decryption process so that the outsourcing SSS-ABE scheme can be applied to IoT devices. 展开更多
关键词 Attribute-based encryption Searchable encryption Outsourcing decryption IoT divices
下载PDF
Decryption of pure-position permutation algorithms 被引量:3
11
作者 赵晓宇 陈刚 +2 位作者 张亶 王肖虹 董光昌 《Journal of Zhejiang University Science》 EI CSCD 2004年第7期803-809,共7页
Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation ... Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown. 展开更多
关键词 decryption Image encryption FUZZY Position permutation
下载PDF
Optical encryption with cascaded fractional wavelet transforms 被引量:1
12
作者 BAO Liang-hua CHEN Lin-fei ZHAO Dao-mu 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第8期1431-1435,共5页
On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to encrypt images. It has the virtues of fractional Fourier transform and wavelet transform. Fractiona... On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to encrypt images. It has the virtues of fractional Fourier transform and wavelet transform. Fractional orders, standard focal lengths and scaling factors are its keys. Multistage fractional Fourier transforms can add the keys easily and strengthen information se-curity. This method can also realize partial encryption just as wavelet transform and fractional wavelet transform. Optical reali-zation of encryption and decryption is proposed. Computer simulations confirmed its possibility. 展开更多
关键词 Wavelet transform (WT) Cascaded fractional wavelet transform (CFWT) encryption decryption
下载PDF
Design of a New Chaos Circuit and Its Encryption to Digital Information 被引量:3
13
作者 王宏 彭建华 周正欧 《Journal of Electronic Science and Technology of China》 2004年第4期25-28,共4页
A new hyperchaos circuit system with simple structure is designed in this paper. It can be implemented with changeable dimensions 3, 5, 7, 9, etc, therefore it can afford different security grades for applications. Th... A new hyperchaos circuit system with simple structure is designed in this paper. It can be implemented with changeable dimensions 3, 5, 7, 9, etc, therefore it can afford different security grades for applications. The dynamic characters of the 7th order circuit have been analyzed as an example. Using the hyperchaos time sequence produced by this circuit as key sequence, the encryption and decryption to digital signals of text and image files have been realized, and the real-time ability has been increased with encrypting digital signals per byte. 展开更多
关键词 HYPERCHAOS dynamic character key sequence encryption
下载PDF
Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore Software Maintenance
14
作者 Atif Ikram Masita Abdul Jalil +6 位作者 Amir Bin Ngah Nadeem Iqbal Nazri Kama Azri Azmi Ahmad Salman Khan Yasir Mahmood Assad Alzayed 《Computers, Materials & Continua》 SCIE EI 2022年第11期3827-3845,共19页
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of ... Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of images.Since the work is done offshore,these agreements or images must be shared through the Internet or stored over the cloud.The breach of privacy,on the other hand,is a potential threat for the image owners as both the Internet and cloud servers are not void of danger.This article proposes a novel algorithm for securing the NDAs in the form of images.As an agreement is signed between the two parties,it will be encrypted before sending to the cloud server or travelling through the public network,the Internet.As the image is input to the algorithm,its pixels would be scrambled through the set of randomly generated rectangles for an arbitrary amount of time.The confusion effects have been realized through an XOR operation between the confused image,and chaotic data.Besides,5D multi-wing hyperchaotic system has been employed to spawn the chaotic vectors due to good properties of chaoticity it has.The machine experimentation and the security analysis through a comprehensive set of validation metric vividly demonstrate the robustness,defiance to the multifarious threats and the prospects for some real-world application of the proposed encryption algorithm for the NDA images. 展开更多
关键词 Non-disclosure agreement encryption decryption secret key chaoticmap CONFUSION diffusion
下载PDF
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
15
作者 Muhammad Nadeem Ali Arshad +4 位作者 Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Moteeb Al Moteri Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第2期4059-4079,共21页
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and preve... Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data.This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse.If this algorithm is applied to the cloud network,the attacker will not be able to access the data.To encrypt the data,the values of the bytes have been obtained by converting the plain text to ASCII.A key has been generated using the Non-Deterministic Bit Generator(NRBG)mechanism,and the key is XNORed with plain text bits,and then Bit toggling has been implemented.After that,an efficient matrix cipher encryption algorithm has been developed,and this algorithm has been applied to this text.The capability of this algorithm is that with its help,a key has been obtained from the plain text,and only by using this key can the data be decrypted in the first steps.A plain text key will never be used for another plain text.The data has been secured by implementing different mechanisms in both stages,and after that,a ciphertext has been obtained.At the end of the article,the latest technique will be compared with different techniques.There will be a discussion on how the present technique is better than all the other techniques;then,the conclusion will be drawn based on comparative analysis. 展开更多
关键词 Symmetric CRYPTOGRAPHY CIPHERTEXT encryption decryption cloud security matrix cipher
下载PDF
Chaos-Based Encryption of ECG Signals: Experimental Results
16
作者 Gutenbert Kenfack Alain Tiedeu 《Journal of Biomedical Science and Engineering》 2014年第6期368-379,共12页
In this work, we suggest a system for chaos-based encryption of electrocardiographic signals. It uses simple electronics organized around a colpitts chaotic oscillator. The system has been designed, implemented and te... In this work, we suggest a system for chaos-based encryption of electrocardiographic signals. It uses simple electronics organized around a colpitts chaotic oscillator. The system has been designed, implemented and tested. The encrypted signal has been decrypted and compared to the original ECG signal. Experimental results were analysed and proved encouraging. 展开更多
关键词 ECG COLPITTS OSCILLATOR CHAOS encryption decryption
下载PDF
ID-Based Threshold Decryption Secure Against Chosen Plaintext Attack
17
作者 龙宇 陈克非 刘胜利 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期127-133,共7页
B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext... B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext attack(CPA), based on the weaker model of security known as selective ID-based threshold CPA and the common model known as ID-based threshold CPA respectively. 展开更多
关键词 threshold decryption identity-based cryptology publicly checkable encryption
下载PDF
VLSI Implementation of Optimized 2D SIMM Chaotic Map for Image Encryption
18
作者 M.Sundar Prakash Balaji V.R.Vijaykumar +2 位作者 Kamalraj Subramaniam M.Kannan V.Ayyem Pillai 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3155-3168,共14页
The current research work proposed a novel optimization-based 2D-SIMM(Two-Dimensional Sine Iterative chaotic map with infinite collapse Mod-ulation Map)model for image encryption.The proposed 2D-SIMM model is derived o... The current research work proposed a novel optimization-based 2D-SIMM(Two-Dimensional Sine Iterative chaotic map with infinite collapse Mod-ulation Map)model for image encryption.The proposed 2D-SIMM model is derived out of sine map and Iterative Chaotic Map with Infinite Collapse(ICMIC).In this technique,scrambling effect is achieved with the help of Chaotic Shift Transform(CST).Chaotic Shift Transform is used to change the value of pixels in the input image while the substituted value is cyclically shifted according to the chaotic sequence generated by 2D-SIMM model.These chaotic sequences,generated using 2D-SIMM model,are sensitive to initial conditions.In the proposed algorithm,these initial conditions are optimized using JAYA optimization algorithm.Correlation coefficient and entropy are considered asfitness functions in this study to evaluate the best solution for initial conditions.The simulation results clearly shows that the proposed algorithm achieved a better performance over existing algorithms.In addition,the VLSI implementation of the proposed algorithm was also carried out using Xilinx system generator.With optimization,the correlation coefficient was-0.014096 and without optimization,it was 0.002585. 展开更多
关键词 Chaotic mapping 2D-SIMM encryption decryption jaya optimization
下载PDF
FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient
19
作者 Fei Yu Zinan Zhang +3 位作者 Hui Shen Yuanyuan Huang Shuo Cai Sichun Du 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第2期109-118,共10页
A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and d... A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and dynamically analyzed,and implemented on FPGA.Then,a new pseudo-random number generator(PRNG)based on MHNN is proposed.The post-processing unit of the PRNG is composed of nonlinear post-processor and XOR calculator,which effectively ensures the randomness of PRNG.The experiments in this paper comply with the IEEE 754-1985 high precision32-bit floating point standard and are done on the Vivado design tool using a Xilinx XC7 Z020 CLG400-2 FPGA chip and the Verilog-HDL hardware programming language.The random sequence generated by the PRNG proposed in this paper has passed the NIST SP800-22 test suite and security analysis,proving its randomness and high performance.Finally,an image encryption system based on PRNG is proposed and implemented on FPGA,which proves the value of the image encryption system in the field of data encryption connected to the Internet of Things(Io T). 展开更多
关键词 memristive Hopfield neural network(MHNN) pseudo-random number generator(PRNG) FPGA image encryption decryption system
下载PDF
Simple optical decryption based on a modified joint transform correlator technique
20
作者 王怀彬 王天佐 袁晓聪 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第2期203-205,共3页
A new encryption/decryption system for optical information security is proposed in this paper. We used an iterative Fourier transform algorithm to optimize the encrypted hologram as well as the decryption key as phase... A new encryption/decryption system for optical information security is proposed in this paper. We used an iterative Fourier transform algorithm to optimize the encrypted hologram as well as the decryption key as phase-only elements. The optical decryption was implemented by superimposing the encrypted hologram and the decryyption key in a simple optical setup. Numerical simulation and optical experiment have confirmed the proposed technique as a simple and easy implementation for optical decryption, demonstrating potential applications in optical information security verification. 展开更多
关键词 computer generated holograms CORRELATOR encryption/decryption
下载PDF
上一页 1 2 65 下一页 到第
使用帮助 返回顶部