登录
首页 » Others » w3mmaster

w3mmaster

于 2008-01-05 发布 文件大小:347KB
0 125
下载积分: 1 下载次数: 9

代码说明:

  主要是对加密了的魔兽地图文件进行解压,从而对加密地图进行修改。(Mainly for encrypted file decompression of Warcraft map, which map be revised encryption.)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  •  使用cryptapi的demo程序
     使用cryptapi加密的demo程序-cryptapi use encryption procedures demo
    2022-01-25 23:14:22下载
    积分:1
  • 这是一个算法,我自己也看不懂,发上来大家看一下
    这是一个加密算法,我自己也看不懂,发上来大家看一下-This is an encryption algorithm, I, for one can not read, the U.S. authorities to look at
    2023-05-01 20:50:03下载
    积分:1
  • 通用de
    Universal De-embedding Procedure
    2022-07-09 01:16:25下载
    积分:1
  • MD5算法得VisualC++6.0源程序,直接调用里面的函数即可
    MD5加密算法得VisualC++6.0源程序,直接调用里面的函数即可-MD5 Encryption Algorithm in Visual C++ 6.0 source code, direct calls to the function can be
    2022-10-27 15:05:04下载
    积分:1
  • solaris 10 dvd md5 文档 说明
    solaris 10 dvd md5 文档 说明-solaris 10 dvd md5 documentation
    2022-01-21 17:46:41下载
    积分:1
  • DES
    标准des加密程序,在dev-cpp编译器下成功编译运行,实现数据加密解密(standard des encryption program using c++)
    2013-12-01 13:57:07下载
    积分:1
  • AES IP core
    While there are many AES cores around, this one is designed with LUT6 based FPGA architecture in mind from day one.  The AES Decryption Core for FPGA implements the decryption portion of the AES (a.k.a. Rijndael) algorithm described in the FIPS-197 specification. Key lengths of 128 / 192 / 256 bits are supported, each with a separate instantiation wrapper. Since the core is designed to take advantage of LUT6 based FPGA archit
    2022-02-06 04:58:15下载
    积分:1
  • spear and shield the contest (2)
    矛与盾之争(二)——CRC原则部分
    2022-01-28 18:36:55下载
    积分:1
  • SHA-1Hash函数源码,可以对任何文件做Hash,得到的Hash值为160位。具有抗强碰撞,弱碰撞等能力。虽然王小云已经找到了个别碰撞。但在新的好的hash函数出来之前仍将被广泛使用。-SHA-1Hash function source, any document can be done right hash, the hash value of 160. Anti-collision, the weak capabilities of the collision. Although Bruce Schneier, had found individual collisions. But the new good hash function will be out before widespread use.
    2023-06-21 07:50:03下载
    积分:1
  • ieee一种基于混沌的新方法An Image Encryption Scheme Based on Chaotic Map...
    ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security
    2022-05-30 11:41:05下载
    积分:1
  • 696518资源总数
  • 104386会员总数
  • 20今日下载