-
des
使用DES算法;可以指定使用DES、2DES或者3DES算法;可以对任意的文件进行加密和解密,加密后文件扩展名为.des,可以指定使用ECB,CBC,CFB,OFB,CTR的任意一种模式;
(The use of DES algorithm can specify the use of DES, 2DES or 3DES algorithm can arbitrary file encryption and decryption, encryption, named after the file extension. Des, you can specify the use of ECB, CBC, CFB, OFB, CTR arbitrary a model )
- 2008-07-05 00:04:05下载
- 积分:1
-
RSA-MFC
RSA-MFC,基于MFC的RSA加密算法的实现,可以用于16进制文件的加解密(RSA-MFC, the MFC based on the realization of RSA encryption algorithm, can be used for 16-band file encryption and decryption)
- 2009-06-15 14:34:51下载
- 积分:1
-
123456
计算卡片过程密钥,加密密码数据,计算安全报文鉴别(MAC)过程密钥 (Calculating card key, the encrypted password data, calculate the safety message authentication (MAC) key)
- 2013-08-14 13:15:47下载
- 积分:1
-
DES_C
基本的DES加密算法,可以实现一些基本的功能,但是大型计算不适合(The basic DES encryption algorithm)
- 2013-08-15 01:48:09下载
- 积分:1
-
RC4
流密码中RC4算法的加密解密的c程序实现(stream cipher)
- 2010-06-02 14:20:47下载
- 积分:1
-
unpack-themida
Themida的另类破解
附件提供的一个程序是用汇编写的PE信息小工具,用Themida1855加密,加密选择RISC-64 processor,全选加密可选项,并对部分API函数使用VM加密,入口虚拟系数选择15。
- 2012-11-06 11:57:45下载
- 积分:1
-
jiamijiemi
说明: vb 加密解密程序 动态加密使用非常方便...(vb encryption and decryption process is very convenient to use dynamic encryption ...)
- 2009-08-03 23:06:04下载
- 积分:1
-
RSA
C++ implementaion for RSA together with the Wiener attack.
It uses NTL library for big numbers
- 2009-04-22 04:54:04下载
- 积分:1
-
1111867176399d9765chaios
加密程序,很好用。亲自验证,完全正确。希望下载。(we can add and unadd a picture correctly.welcom to download.)
- 2012-05-17 12:06:01下载
- 积分:1
-
39.3
说明: 编制程序,将输入的一行字符以加密的形式输出,然后将其解密,解密的字符串序列与输入的正文相比较,吻合时输出解密的正文,否则解密失败。
加密时,将每个字符的ascii码依次反复加上“4962873”中的数字,并在32(‘’)~122(‘z’)之间作模运算。解密与加密的顺序相反。例如输入正文“the result of 3 and 2 is not 8” 结果为:
(Programming, the input line character output in an encrypted form, and then decrypted, the decrypted text sequence of characters compared with the input, output to decrypt the body of the agreement, otherwise the decryption failed. Encryption, ascii code of each character in turn repeatedly with " 4962873" in the figures, and 32 (' ' )~ 122 (' z' ) as a model between the operations. Decryption and encryption in reverse order. For example, enter the text " the result of 3 and 2 is not 8" results:)
- 2011-04-05 08:43:48下载
- 积分:1