登录
首页 » 加密解密 » compact rapid text file encryption tool, using RC4 algorithm, support 256 charac...

compact rapid text file encryption tool, using RC4 algorithm, support 256 charac...

于 2022-06-30 发布 文件大小:21.26 kB
0 73
下载积分: 2 下载次数: 1

代码说明:

小巧快速的加密文本文件的工具,采用RC4算法,支持256个字符长度的密码,-compact rapid text file encryption tool, using RC4 algorithm, support 256 characters in length of the password,

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • encrypt image
    加密数字图像的主要源码 加密数字图像的主要源码-encrypt image
    2023-04-06 13:20:04下载
    积分:1
  • MISTY 算法 二进制兼容的算法,匙可到128位
    MISTY 加密算法 二进制兼容的加密算法,加密匙可到128位-MISTY binary compatible encryption algorithm encryption algorithms, encryption keys can be 128
    2022-03-26 13:35:10下载
    积分:1
  • 这是个好东西,可以代替系统的记事本。
    这是个好东西,可以代替系统的记事本。-This a good thing, the system can replace the notebook.
    2022-03-03 23:41:30下载
    积分:1
  • A MD5 Source Code which can be run after translation and edition. It contains ma...
    一个可以实际编译运行的 MD5算法原代码,含main调试程序。-A MD5 Source Code which can be run after translation and edition. It contains main debug program.
    2022-03-24 17:03:23下载
    积分:1
  • LINUX下使用Ansi C编写的MD5消息散列算法
    LINUX下使用Ansi C编写的MD5消息散列算法-LINUX use Ansi C prepared news MD5 hash algorithm
    2023-08-26 05:15:03下载
    积分:1
  • 山排序算法:基本思想:全序无序分离…
    希尔排序算法: 基本思想:将整个无序序列分割成若干小的子序列分别进行插入排序。 序列分割方法:将相隔某个增量h的元素构成一个子序列。在排序过程中,逐次减小这个增量,最后当h减到1时,进行一次插入排序,排序就完成。增量序列一般采用:ht=2t-1,1≤t≤[log2n],其中n为待排序序列的长度。-Hill sorting algorithm: the basic idea: the whole sequence disorder is separated into a number of small sub-sequences respectively Insertion Sort. Sequence segmentation method: h will be separated by an incremental elements constitute a subset of sequences. In the sort process, the successive decrease of the increment, and finally reduced to one when h when an insertion sort, sort completed. Incremental sequence generally use: ht = 2t-1, 1 ≤ t ≤ [log2n], in which n is the length of sequence to be sorted.
    2022-02-06 21:23:34下载
    积分:1
  • ieee一种基于混沌的新方法An Image Encryption Scheme Based on Chaotic Map...
    ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security
    2022-05-30 11:41:05下载
    积分:1
  • 此程序为3栏栅算法程序,可对一段明文字符 作者:万艳良 单位:武汉理工大学...
    此程序为3栏栅加密算法程序,可对一段明文字符加密 作者:万艳良 单位:武汉理工大学-this procedure for three fencing encryption algorithm procedures, the section expressly characters encryption Author : 10000-Yan units : Wuhan Polytechnic University
    2022-08-12 12:11:34下载
    积分:1
  • 椭圆曲线Elliptic Curve)算法(
    椭圆曲线Elliptic Curve)加密算法(-Elliptic Curve Elliptic Curve) encryption algorithm (
    2023-04-18 23:25:03下载
    积分:1
  • MD5生成器,可以生成字符串或文件的MD5值
    MD5生成器,可以生成字符串或文件的MD5值-MD5 Generator can generate the MD5 string or document the value of
    2022-04-13 06:52:13下载
    积分:1
  • 696518资源总数
  • 104269会员总数
  • 31今日下载