-
罗云彬的《Win32 汇编程序设计》随书源码光盘
汇编程序写的Hash校检程序,分享源码,支持SHA1和MD5两种,支持拉拽,支持剪切板的复制和比对,有进行条,自动计算耗时
(使用了不太精确的计时器),速度还是可以的,大概就这样。
- 2023-07-11 15:50:02下载
- 积分:1
-
OPT一次性动态口令验证算法。根据动态支持TOTP和HOTP验证。
OPT一次性动态口令验证算法。根据动态支持TOTP和HOTP验证。-A one-time dynamic password authentication algorithm OPT. According to dynamic support for TOTP and HOTP authentication.
- 2022-09-14 03:40:03下载
- 积分:1
-
Cryptography to learn C language library
密码学学习的C语言函数库――Miracl库。对密码学学习很有帮助-Cryptography to learn C language library- Miracl library. Very helpful for learning cryptography
- 2022-03-12 21:45:19下载
- 积分:1
-
在微软CryptoAPI公共使用
Microsoft CryptoAPI中公私密钥对的使用、HASH算法、数字签名等技术-Microsoft CryptoAPI in the use of public-private key pair, HASH algorithm, digital signature technology
- 2022-12-19 04:50:03下载
- 积分:1
-
Crypton algorithm realization.
Crypton algorithm realization.
- 2022-09-05 10:35:02下载
- 积分:1
-
VB source code of MD5 algorithm is the MD5 algorithm for VB source code of MD5 a...
VB的MD5算法源码 VB的MD5算法源码-VB source code of MD5 algorithm is the MD5 algorithm for VB source code of MD5 algorithm for VB source code
- 2022-05-26 03:10:41下载
- 积分:1
-
全功能的加密库,对称加密,非对称加密,单向加密,等待,最新版本...
全功能的加密库,对称加密,非对称加密,单向加密,等待,最新版本-Full-featured encryption library, symmetric encryption, asymmetric encryption, one-way encryption, to wait, the latest version
- 2022-01-26 07:04:58下载
- 积分:1
-
rda加密源代码
rda加密源代码-The source code of RSA encryption algorithm
- 2022-06-18 20:51:01下载
- 积分:1
-
DES算法源代码,这是自己书写的源代码,里面采用了非常多的技巧来提高编解码的效率,研究算法和源码的朋友们,我书写的这个代码可以作为你们很好的参考。...
大连110指挥界面,用vc做的,但是的需要数据库支持,界面部分功能需要数据库支持-command interface using vc done, but the need for database support, the functional interface need database support
- 2022-02-03 02:47:07下载
- 积分:1
-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1