-
实现RSA
RSA加密算法的实现
2^1024大的素数实现-implement the RSA
- 2022-04-29 03:25:57下载
- 积分:1
-
Super rabbit has a file encryption, file is encrypted then, open the file, back...
超级兔子有一个文件加密功能,文件被加密以后,打开该文件时,回转到控制面板,可是我们忘了密码怎么办呢?这里提供了一个简单方法-Super rabbit has a file encryption, file is encrypted then, open the file, back to the control panel, but we forget the password how to do? Here provides a simple way
- 2022-09-12 14:50:03下载
- 积分:1
-
RC2 algorithm source code
RC2算法源代码-RC2 algorithm source code
- 2023-06-22 20:55:03下载
- 积分:1
-
several RSA DES algorithm C program should not miss
RSA DES 等几个算法的C程序,不要错过-several RSA DES algorithm C program should not miss
- 2022-05-24 04:34:43下载
- 积分:1
-
简单的RSA加密范例
简单的RSA加密范例-simple example of the RSA encryption
- 2022-08-05 12:37:46下载
- 积分:1
-
把AES算法封装成DLL方便掉用。
我只是做了简单修改,版权归原作者所有...
把AES算法封装成DLL方便掉用。
我只是做了简单修改,版权归原作者所有-put into AES Packaging swap used to facilitate DLL. I just made a simple change Lastings all the original author
- 2022-02-15 07:02:55下载
- 积分:1
-
java加密程序
java加密程序-java encryption
- 2022-08-24 02:23:45下载
- 积分:1
-
x264编码一个可执行程序的x264.exe,因为我只修改X264算法…
一个x264编码的可执行程序 x264.exe,因为我只修改了 x264 的算法,未加入任何汇编,也没有修改x264的接口和功能,所以原版 x264 能运行的平台,此程序也应当能运行,且功能及调用方式不变。
执行命令方式为:
-o 输出文件 输入文件 宽x高 -B 目标码率-X264 encoding an executable program x264.exe, because I only modified x264 algorithms, not to join any compilation, there is no modification of the interface and functionality of x264, the x264 can run the original platform, this procedure should also be able to run, and function and calls the same way. For the implementation of the order:-o output file input file width x high-B target rate
- 2022-05-21 01:18:22下载
- 积分:1
-
差分密码分析,此实验是对S
差分密码分析,此实验是对S-P密码体制的差分分析-differential cryptanalysis, the experiment of S-P Cryptosystem Differential Analysis
- 2022-07-20 18:23:49下载
- 积分:1
-
twocrypt(2c)是一个 PoC工具,用于超狂妄者。它把两个文件加密成一个。不同的口令可以用于解译不同的变量。输出不能从单个加密文件中识别出来,并且这个工
twocrypt(2c)是一个 PoC工具,用于超狂妄者。它把两个文件加密成一个。不同的口令可以用于解译不同的变量。输出不能从单个加密文件中识别出来,并且这个工具使用一种合法的算法,这种算法本身并不意味着要隐藏任何信息。-twocrypt (2c) is a PoC tool, uses in the ultra arrogance. It
encrypts two documents. The different password may use in the solution
to translate the different variable. The output cannot from
individually encrypt in the document to distinguish, and this tool
uses one legitimate algorithm, this algorithm itself certainly did not
mean must hide any information.
- 2022-11-27 16:40:03下载
- 积分:1