-
these two works mainly with a CSP. CSPTEST comparison was made mainly to the cha...
这两个工程主要用CSP
1、CSPTEST 写的比较乱 主要是给当时一个朋友做参考调用的 完成非对称密钥的生成、导入、导出、加密、解密、对称的加密解密、签名、验证。
2、CSTTEST2 写的比前个好些,但是平时上班,下班自己也要写论文,所以花的时间也不太多,很多地方都偷懒了。比如文件大小我没有用NEW 而且指定了1024 有需要的朋友可以自己修改。这个工程主要是非对称的密钥的导出和导入,还有就是会话密钥的操作。-these two works mainly with a CSP. CSPTEST comparison was made mainly to the chaos when a friend called to refer to the completion of the non-symmetric key generation, importing and exporting, encryption, decryption, symmetric encryption and decryption, signature, the certification. 2, CSTTEST2 write better than in the previous months, but usually go to work and finish their own toilet paper so I spent the time is not too much, all of the lazy. For instance, file size I have not used the NEW 1024 and designated a need to amend their friends. The project mainly non-symmetric keys to the Export and Import, there is the session key operation.
- 2022-03-21 02:06:35下载
- 积分:1
-
java写的椭圆曲线加密(ECC)算法源码
java写的椭圆曲线加密(ECC)算法源码-java writes the elliptic curve encryption (ECC) calculates the
law origin code
- 2023-01-21 16:00:04下载
- 积分:1
-
安装时修改执行文件记录硬件配置参数从而做唯一安装标志防止非法复制...
安装时修改执行文件记录硬件配置参数从而做唯一安装标志防止非法复制- Installs when revises the execution file recording hardware
disposition parameter thus to do only installs the symbol to prevent
illegal duplicates
- 2022-03-12 19:01:03下载
- 积分:1
-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1
-
idea3a,idea3b,idea3c加密算法
idea3a,idea3b,idea3c加密算法-idea3a,idea3b and idea3c encrypting algorithms
- 2023-01-19 10:45:04下载
- 积分:1
-
md5 source code, I had the source code but do not know how to use Oh, please enl...
md5的源代码,我下了源代码不过不知道怎么使用哦,请各位大哥多多指教呀!-md5 source code, I had the source code but do not know how to use Oh, please enlighten me a lot of big brother!
- 2022-10-16 03:15:03下载
- 积分:1
-
各种加密算法合集,是研究加密算法最好的资料。
各种加密算法合集,是研究加密算法最好的资料。-A variety of encryption algorithms Collection, is to study the best data encryption algorithm.
- 2022-07-05 05:00:09下载
- 积分:1
-
C++ MD5开发组件
C++ MD5开发组件-C++ MD5 development component
- 2022-04-06 19:01:04下载
- 积分:1
-
MD5算法的VC示例,非常 好!
MD5算法的VC示例,非常 好!-MD5 algorithm VC example, a very, very good!
- 2022-08-10 21:18:20下载
- 积分:1
-
SIMPLOGIN
SIMPLOGIN
- 2022-07-10 07:14:10下载
- 积分:1