-
公钥加密程序,采用非对称密钥,这里以类的形式调用
公钥加密程序,采用非对称密钥,这里以类的形式调用-Public key encryption procedures, the use of non-symmetric key, where to type the form of call
- 2022-07-02 03:55:21下载
- 积分:1
-
Rijndael算法源代码
Rijndael算法源代码-Rijndael algorithm source code
- 2022-02-22 07:05:47下载
- 积分:1
-
It s about algorithm for caesar encode
It s about algorithm for caesar encode
- 2022-03-10 12:41:41下载
- 积分:1
-
各种反分析软件的手法,包括(反Dede,反单步跟踪,反SoftICE,Ollydbg,反静态分析,以及程序自身的CRC32效验等,对于初学者有很大的帮助.
各种反分析软件的手法,包括(反Dede,反单步跟踪,反SoftICE,Ollydbg,反静态分析,以及程序自身的CRC32效验等,对于初学者有很大的帮助.-Analysis of various anti-software approach, including the (Anti-Dede, anti-single-step tracking, anti-SoftICE, Ollydbg, anti-static analysis, as well as procedures for their own well-tested, such as CRC32, for beginners and has a great help.
- 2022-08-03 04:58:45下载
- 积分:1
-
简单的基于DES的加密算法及雪崩效应分析。请仔细阅读内附的说明文件。...
简单的基于DES的加密算法及雪崩效应分析。请仔细阅读内附的说明文件。-DES encryption algorithm and analysis of avalanche effect. Please read the attached note.
- 2022-04-08 08:10:45下载
- 积分:1
-
Weather radar echo generated for this code is its own no problem, I used
天气雷达回波产生 这个代码是自己编的 我用过没什么问题-Weather radar echo generated for this code is its own no problem, I used
- 2022-03-22 03:46:03下载
- 积分:1
-
has160哈希函数。用散列的方法将明文处理达到加密的效果。
has160哈希函数。用散列的方法将明文处理达到加密的效果。
- 2022-11-21 02:50:02下载
- 积分:1
-
以前发的那个只实现了SHA
以前发的那个只实现了SHA-1, 现在补全了,
sha-160, sha-224, sha-256, sha-384, sha-512-Previously issued only to realize that the SHA-1, is now a complete, sha-160, sha-224, sha-256, sha-384, sha-512
- 2023-09-06 02:25:03下载
- 积分:1
-
TSecurity提供登陆/注销/修改口令的控件。(有源代码)工作在:D1 D2 D3 D4 D5。作者:Ma Jun...
TSecurity提供登陆/注销/修改口令的控件。(有源代码)工作在:D1 D2 D3 D4 D5。作者:Ma Jun-TSecurity provide landing/cancellation/Modify password controls. (Source code) work: D1 D2 D3 D4 D5. Author: Ma Jun
- 2023-03-31 17:45:04下载
- 积分:1
-
一个周期3的多表代替密码,第1个表由密钥字法产生(密钥字自拟),第2个表由洗牌法产生(注意,字母a~z与数字0~25一一对应),第三个表由公式法产生(数学公式自...
一个周期3的多表代替密码,第1个表由密钥字法产生(密钥字自拟),第2个表由洗牌法产生(注意,字母a~z与数字0~25一一对应),第三个表由公式法产生(数学公式自拟,注意它须是Z26上的一个一一变换)-a cycle of three multi-table instead of passwords, a table by key word method, (key word from the intended), Table No. 2 produced by shuffling method (note, a letter with a number of z ~ 0 ~ 25 he gathers), 3rd tables generated by the formula (from the proposed mathematical formula, it should pay attention to the Z26 is a transformation on January 1)
- 2022-01-25 14:05:08下载
- 积分:1