登录
首页 » 加密解密 » AES has been certified by the AES DELPHI, the better, we all give it a try and f...

AES has been certified by the AES DELPHI, the better, we all give it a try and f...

于 2022-03-19 发布 文件大小:34.11 kB
0 102
下载积分: 2 下载次数: 1

代码说明:

已经通过AES认证的AES的DELPHI实现,比较好,大家自己试试看,搜的-AES has been certified by the AES DELPHI, the better, we all give it a try and found the

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论


0 个回复

  • COBRA cipher algorithm example.
    COBRA cipher algorithm example.
    2022-03-06 21:09:35下载
    积分:1
  • blind input method, using Microsoft's TTS achieve blind calligraphy
    盲人输入法,利用微软的TTS实现盲人书法-blind input method, using Microsoft"s TTS achieve blind calligraphy
    2022-02-01 23:05:14下载
    积分:1
  • Multicast key batch update algorithm, Based on the LKH single Rekeying program a...
    组播密钥的批次更新算法,基于LKH的单次密钥更新方案和Batch Rekeying方案的原理、结构和密钥更新过程等。并着重对 Batch Rekeying 方案的性能与单次密钥更新方案作了简单的比较。 通过比较和分析得到结论:定时更新的Batch Rekeying 方案在更新开销上比单次更新更有优势 -Multicast key batch update algorithm, Based on the LKH single Rekeying program and the program Batch Rekeying principle, Rekeying structure and processes. And Batch Rekeying focused on the performance of the program with a single Rekeying program with a simple comparison. By comparing and analyzing conclusions : regularly updated Batch Rekeying program in the updated overhead than a single update more advantages
    2022-03-12 16:24:24下载
    积分:1
  • delphi组件
    delphi加密组件-delphi encryption components
    2022-03-24 01:44:51下载
    积分:1
  • PE程序壳源程序
    PE程序加密壳源程序 -PE procedure encryption shell source program
    2022-08-13 03:42:19下载
    积分:1
  • JAVA中license控制实现实例
    现在很多J2EE应用都采用一个license文件来授权系统的使用,特别是在系统购买的早期,会提供有限制的license文件对系统进行限制,比如试用版有譬如IP、日期、最大用户数量的限制等。 而License文件中的Base64或BEA公司现在是WebLo
    2022-10-16 11:30:03下载
    积分:1
  • ABE(Attribute
    ABE加密(Attribute-Based Encryption)算法的一种实现方案-Source code for ABE(Attribute-Based Encryption)
    2022-05-15 00:41:47下载
    积分:1
  • 代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
    2023-06-18 10:00:03下载
    积分:1
  • OllyDbg中文帮助发布于: 2004.12.24(看雪)文件名:OllyDbg.hlpMD5值:375d4bbe751f28e3f3bf7c5d2446c0...
    OllyDbg中文帮助发布于: 2004.12.24(看雪)文件名:OllyDbg.hlpMD5值:375d4bbe751f28e3f3bf7c5d2446c09a发布时间:2004.12.25翻译:TT小组曾经参与 OllyDbg 文档翻译工作的人员(按字母顺序):babyfox (是他第一次尝试翻译完全部OllyDbg)cyclotron[TT]flykuangtudazuo[TT]kvllzonlyu[TT]rigley[TT]Roba[TT]SwordLea[TT]zdd[TT]ZMWorm[TT] zmworm@sohu.com -OllyDbg Chinese help in the release : Dec.24, 2004 (See snow) File Name : OllyDbg.hlpMD5 value : 375d4bbe751f28e3f3bf7c5d2446c09a Release time : 2004.12.25 Translation : TT OllyDbg group had been involved in the translation of documents (in alphabetical order) : babyfox (yes his first attempt to fully translate the Department OllyDbg) cyclotron flykuangtudazuo [TT] [TT] kvllzonlyu rigley [TT] [TT] Roba SwordLea [TT] [TT] zdd ZMWorm [TT] [TT] zmworm@sohu.com
    2023-01-09 02:20:03下载
    积分:1
  • 一个3des算法的库文件和使用库文件的例子
    一个3des算法的库文件和使用库文件的例子- A 3des algorithm storehouse document and use storehouse document example
    2022-02-24 15:06:22下载
    积分:1
  • 696518资源总数
  • 104692会员总数
  • 59今日下载