-
RC4
对RC4加密解密代码,可以自行修改密钥!类可以直接调用(RC4 encryption and decryption code, you can modify the key! Class can be called directly)
- 2020-10-13 23:17:31下载
- 积分:1
-
RSA
RSA加密算法,实现对文字的加密,将文字转化成数字后用RSA原理进行加密(This is RSA encryption algorithm)
- 2013-12-01 20:17:45下载
- 积分:1
-
19824363RSA
分析RSA算法的应用现状,论证文件加密应用RSA算法的可行性和意义。设计一套完整实用的RSA文件加密解决方案,具体编码实现。对RSA算法进行研究,从常规RSA算法出发,用C++实现RSA加密算法类库,并在32位windows平台封装成组件。在.Net平台引用此组件,实现可以对任意文件进行RSA加密
(Analysis of Application of RSA algorithm, file encryption application demonstration of the feasibility of RSA algorithm and significance. Design of a complete file encryption RSA practical solutions to achieve specific coding. Research on the RSA algorithm, starting from the conventional RSA algorithm using C++ class library to achieve RSA encryption algorithm, and in 32-bit windows platform components into a package. In. Net platform, referred to this component, the realization of arbitrary files on RSA encryption)
- 2009-06-02 18:09:17下载
- 积分:1
-
md52
信息加密原码,用md5算法实现,开发语言:c(original message encryption code used md5 algorithm, the development of language : c)
- 2007-05-26 10:40:50下载
- 积分:1
-
des
des经典加密算法,实现数据交互过程中的保密(des classical encryption algorithm, data confidentiality during the interaction)
- 2013-12-19 18:38:55下载
- 积分:1
-
ESPU
此资料为加密芯片资料,里面有例程,是很好的资料(This data encryption chip data, there are routine, the data is good)
- 2010-12-03 16:57:14下载
- 积分:1
-
MD5
MD5算法描述(略)。
设计一个模拟的系统用户安全登录界面,采用MD5算法实现用户登录口令的安全认证。要求模拟界面至少具有用户口令文件的注册和用户登录时输入的口令是否正确的结果提示两个功能。
(MD5 algorithm description (abbreviated). The design of a simulation system security log user interface, using MD5 algorithm users log on password security authentication. Analog interface requirements at least a registered user password files and user login password is entered when the correct results suggest that the two functions.)
- 2008-06-23 11:13:42下载
- 积分:1
-
duobiaotidai
一个周期3的多表代替密码,第1个表由密钥字法产生(密钥字自拟),第2个表由洗牌法产生(注意,字母a~z与数字0~25一一对应),第三个表由公式法产生(数学公式自拟,注意它须是Z26上的一个一一变换)(a cycle of three multi-table instead of passwords, a table by key word method, (key word from the intended), Table No. 2 produced by shuffling method (note, a letter with a number of z ~ 0 ~ 25 he gathers), 3rd tables generated by the formula (from the proposed mathematical formula, it should pay attention to the Z26 is a transformation on January 1))
- 2006-10-10 17:33:56下载
- 积分:1
-
peregv
VB程序注册机范例,控件简单实用,采用流行且难以破解的算法加密机器码、序列号、注册码,能更好地保护您的软件(VB program RI example, the controls simple and practical, using the popular and difficult to machine code to crack the encryption algorithms, serial numbers, registration codes, can better protect your software)
- 2014-03-24 18:07:41下载
- 积分:1
-
AES_CMAC
AES加密,并完成基于AES的CAMC操作(AES encryption and the AES operation is completed based on CAMC)
- 2014-11-08 23:11:00下载
- 积分:1