登录
首页 » 加密解密 » 根据自己的加密要求可以修改,MD5加密处理单元。

根据自己的加密要求可以修改,MD5加密处理单元。

于 2023-02-26 发布 文件大小:2.29 kB
0 69
下载积分: 2 下载次数: 1

代码说明:

根据自己的加密要求可以修改,MD5加密处理单元。-According to their own requirements can be amended encryption, MD5 encryption processing unit.

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • StreamSec Security Library含有多种算法的控件
    StreamSec Security Library含有多种算法的控件-StreamSec Security Library contains a variety of control algorithms
    2022-06-28 18:47:44下载
    积分:1
  • 试验应用
    Test application for SHA
    2022-05-11 00:29:38下载
    积分:1
  • Openssl 0.9.8h 最新版OpenSSL
    Openssl 0.9.8h 最新版OpenSSL -Openssl 0.9.8h the latest version of OpenSSL
    2022-02-20 07:02:49下载
    积分:1
  • 在 c + + 中实现 RC4 算法
    首先,RC4算法生成一个“状态”,这开始为包含在订单值0-255的数组。然后该算法通过阵列迭代和周围交换的元素,基于所述键值。原始密钥然后可被丢弃,因为RC4只使用状态来创建一个伪随机密钥流,由算法选择的元素和吐出出来。密钥流的所述状态单靠额外的好处是,原来的密钥并不需要被保存在内存中。算法初始化状态。执行密钥调度算法(KSA)上的状态下,根据所输入的键(然后其可以被丢弃)。在算法选择(现炒)的状态,并将其输出作为密钥流元素。
    2023-04-10 10:30:03下载
    积分:1
  • DES to achieve fully their own! Able to enter the selected string or the realiza...
    DES完全自己实现!能对输入字符串或者选定实现CBC,CFB-1,-8,-64等模式。算法自带有效率检测函数,运行结束显示系统效率。此源代码完全胜任课程设计,就算是毕业设计也只需进行一点改进。欢迎大家下载!-DES to achieve fully their own! Able to enter the selected string or the realization of CBC, CFB-1,-8,-64, such as model. Efficient detection algorithm own function, run the end of display system efficiency. This source code fully qualified for curriculum design, even if it is also just graduated from design to improve a little. Welcome you to download!
    2022-01-22 15:36:03下载
    积分:1
  • des数据标准算法描述
    des数据加密标准算法描述-des data encryption standard algorithm description
    2022-12-18 14:20:02下载
    积分:1
  • ESCROW算法的实现算法!
    ESCROW算法的实现算法!-ESCROW algorithm algorithm!
    2023-07-10 07:15:03下载
    积分:1
  • MD5算法的VC示例,非常 好!
    MD5算法的VC示例,非常 好!-MD5 algorithm VC example, a very, very good!
    2022-08-10 21:18:20下载
    积分:1
  • hash算法的vb实现.很好用!
    hash算法的vb实现.很好用!-hash algorithm to achieve the vb. With good!
    2022-03-21 07:41:04下载
    积分:1
  • 128192和256位钥的码Twofish的VHDL实现。
    VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.-VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some
    2022-07-08 23:33:44下载
    积分:1
  • 696518资源总数
  • 104228会员总数
  • 45今日下载