登录
首页 » 加密解密 » 用Visual Studio 2003编的文件加密程序,能对文件进行二进制读入,再和密码做异或,保存。版本一...

用Visual Studio 2003编的文件加密程序,能对文件进行二进制读入,再和密码做异或,保存。版本一...

于 2023-03-19 发布 文件大小:3.52 MB
0 114
下载积分: 2 下载次数: 1

代码说明:

用Visual Studio 2003编的文件加密程序,能对文件进行二进制读入,再和密码做异或,保存。版本一-Visual Studio 2003 for use of file encryption program, can read a binary file, and then do XOR and password, save. Version 1.0

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论


0 个回复

  • 罗宾
    素数Robin―Millor测试法的C语言源码-Robin-Millor prime test of the C language source
    2022-12-02 15:55:03下载
    积分:1
  • The source code of IDEA encryption algorithm
    idea加密算法源代码-The source code of IDEA encryption algorithm
    2022-06-11 15:55:08下载
    积分:1
  • 详细的AESRSASHA1实现原理,其中RSA中内容自建的大书包。
    详细的AESRSASHA1实现原理,其中RSA中内容自建的大书包。-Detailed AESRSASHA1 Principle, in which the contents of self-RSA big bags.
    2023-08-30 02:35:03下载
    积分:1
  • Base64 encoding and decoding, MD5 encryption source DEMO
    Base64编码与解码,MD5加密源码 DEMO-Base64 encoding and decoding, MD5 encryption source DEMO
    2023-04-04 00:25:03下载
    积分:1
  • NTL 大数运算库 专门RSA等算法运算库
    NTL 大数运算库 专门RSA等加密算法运算库-Large numbers operator NTL library dedicated RSA encryption algorithm such as library operations
    2022-01-25 16:00:42下载
    积分:1
  • 在WTL程序中使用MD5算法的一个实现例子。
    在WTL程序中使用MD5算法的一个实现例子。-WTL program in the MD5 algorithm using the example of an implementation.
    2022-03-22 22:05:53下载
    积分:1
  • 简单的源程序
    简单的加密源程序-simple encryption source
    2022-08-15 11:23:47下载
    积分:1
  • ieee一种基于混沌的新方法An Image Encryption Scheme Based on Chaotic Map...
    ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security
    2022-05-30 11:41:05下载
    积分:1
  • java java java ECC ECC E
    java ecc java ecc java e-java eccjava eccjava eccjava eccjava ecc
    2022-07-27 19:53:30下载
    积分:1
  • RSA算法介绍
    RSA算法介绍-RSA algorithm introduced
    2022-02-04 06:15:53下载
    积分:1
  • 696518资源总数
  • 104552会员总数
  • 3今日下载