登录
首页 » 加密解密 » 循环异或

循环异或

于 2022-07-11 发布 文件大小:12.65 kB
0 150
下载积分: 2 下载次数: 1

代码说明:

循环异或-XOR cycle

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论


0 个回复

  • 基于51单片机的码锁设计
    基于8位密码,每位密码值范围为5秒,连续三次键入错误报警1秒的开锁提示音;(5)密码设定完毕后有5秒内未进入,自动锁闭。LED输出模块,数码管(
    2022-02-04 14:31:45下载
    积分:1
  • 很 强 大 的 系 统。初 学 者 好 处 大!
    很 强 大 的 加 密 系 统。初 学 加 解 密者 好 处 大! -Very strong encryption system. Learning the benefits of encryption and decryption are great!
    2022-01-27 14:04:07下载
    积分:1
  • c环境下的md5程序
    c环境下的md5加密程序-c environment of md5 encrypted
    2022-08-10 06:06:19下载
    积分:1
  • des算法实现源码
    des算法实现源码-des algorithm realization source code
    2022-10-25 02:15:03下载
    积分:1
  • DES类,可以自定义key,可以更改IP置换表
    DES加密类,可以自定义key,可以更改IP置换表-DES encryption type, you can customize the key, you can change the IP permutation table
    2022-09-26 13:30:03下载
    积分:1
  • 这是RC5算法的实现
    这是RC5算法的实现-This is the realization of RC5 Algorithm
    2022-12-26 09:25:03下载
    积分:1
  • 高级标准AES优胜算法Rijndael c语言源代码。
    高级加密标准AES优胜算法Rijndael c语言源代码。-Advanced Encryption Standard algorithm Rijndael winning c language source code.
    2022-03-26 03:03:41下载
    积分:1
  • IDEA算法(PGP中使用的算法)
    IDEA加密算法(PGP中使用的加密算法)-IDEA Encryption Algorithm (using PGP encryption algorithm)
    2022-08-09 22:07:32下载
    积分:1
  • AES complete source
    AES算法完整源码-AES complete source
    2022-09-20 15:30:04下载
    积分:1
  • 代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
    2023-06-18 10:00:03下载
    积分:1
  • 696518资源总数
  • 105159会员总数
  • 5今日下载