登录
首页 » 加密解密 » 简单的加密算法 简单的加密算法 vb

简单的加密算法 简单的加密算法 vb

于 2022-02-03 发布 文件大小:2.42 kB
0 92
下载积分: 2 下载次数: 1

代码说明:

简单的加密算法 简单的加密算法 vb-simple encryption algorithm is simple encryption algorithm vb

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • these two works mainly with a CSP. CSPTEST comparison was made mainly to the cha...
    这两个工程主要用CSP 1、CSPTEST 写的比较乱 主要是给当时一个朋友做参考调用的 完成非对称密钥的生成、导入、导出、加密、解密、对称的加密解密、签名、验证。 2、CSTTEST2 写的比前个好些,但是平时上班,下班自己也要写论文,所以花的时间也不太多,很多地方都偷懒了。比如文件大小我没有用NEW 而且指定了1024 有需要的朋友可以自己修改。这个工程主要是非对称的密钥的导出和导入,还有就是会话密钥的操作。-these two works mainly with a CSP. CSPTEST comparison was made mainly to the chaos when a friend called to refer to the completion of the non-symmetric key generation, importing and exporting, encryption, decryption, symmetric encryption and decryption, signature, the certification. 2, CSTTEST2 write better than in the previous months, but usually go to work and finish their own toilet paper so I spent the time is not too much, all of the lazy. For instance, file size I have not used the NEW 1024 and designated a need to amend their friends. The project mainly non-symmetric keys to the Export and Import, there is the session key operation.
    2022-03-21 02:06:35下载
    积分:1
  • java写的椭圆曲线(ECC)算法源码
    java写的椭圆曲线加密(ECC)算法源码-java writes the elliptic curve encryption (ECC) calculates the law origin code
    2023-01-21 16:00:04下载
    积分:1
  • 安装时修改执行文件记录硬件配置参数从而做唯一安装标志防止非法复制...
    安装时修改执行文件记录硬件配置参数从而做唯一安装标志防止非法复制- Installs when revises the execution file recording hardware disposition parameter thus to do only installs the symbol to prevent illegal duplicates
    2022-03-12 19:01:03下载
    积分:1
  • 代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
    2023-06-18 10:00:03下载
    积分:1
  • idea3a,idea3b,idea3c算法
    idea3a,idea3b,idea3c加密算法-idea3a,idea3b and idea3c encrypting algorithms
    2023-01-19 10:45:04下载
    积分:1
  • md5 source code, I had the source code but do not know how to use Oh, please enl...
    md5的源代码,我下了源代码不过不知道怎么使用哦,请各位大哥多多指教呀!-md5 source code, I had the source code but do not know how to use Oh, please enlighten me a lot of big brother!
    2022-10-16 03:15:03下载
    积分:1
  • 各种算法合集,是研究算法最好的资料。
    各种加密算法合集,是研究加密算法最好的资料。-A variety of encryption algorithms Collection, is to study the best data encryption algorithm.
    2022-07-05 05:00:09下载
    积分:1
  • C++ MD5开发组件
    C++ MD5开发组件-C++ MD5 development component
    2022-04-06 19:01:04下载
    积分:1
  • MD5算法的VC示例,非常 好!
    MD5算法的VC示例,非常 好!-MD5 algorithm VC example, a very, very good!
    2022-08-10 21:18:20下载
    积分:1
  • SIMPLOGIN
    SIMPLOGIN
    2022-07-10 07:14:10下载
    积分:1
  • 696518资源总数
  • 104349会员总数
  • 32今日下载