登录
首页 » Java » Caesar

Caesar

于 2011-04-27 发布 文件大小:1KB
0 128
下载积分: 1 下载次数: 9

代码说明:

  java实现的Caesar移位密码,可以实现加密和解密功能!(java implementation of the Caesar shift passwords, encryption and decryption functions can be achieved!)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 常见算法汇总的C++实现,初学算法者适用
    常见加密算法汇总的C++实现,初学加密算法者适用-Common encryption algorithm aggregate C++ Realize, learning to apply the encryption algorithm
    2022-01-20 23:18:21下载
    积分:1
  • MD5算法 vb
    MD5算法,vb编写,纯手工无私奉献,极力推荐下载!复制粘贴可直接使用!调用函数直接是MD5(),简单易懂,不可逆!
    2022-07-01 03:00:44下载
    积分:1
  • C语言环境下的AES算法,支持128位的AES
    C语言环境下的AES加密算法,支持128位的AES加密。-C language environment AES encryption algorithm, support 128-bit AES encryption.
    2022-12-27 22:20:04下载
    积分:1
  • DES
    简单介绍了des算法及其工作模式,对初学des算法者有一定的指导作用(Brief des algorithm and its work mode guidance beginner des algorithm)
    2013-03-19 20:22:07下载
    积分:1
  • 创建巨型文件的参考源代码
    创建巨型文件的参考源代码-create huge document reference source code
    2023-05-06 15:20:02下载
    积分:1
  • AML-Efficient-Approximate-Membership
    AML EFFICIENT APPROXIMATE MEMBERSHIP LOCALIZATION WITHIN A WEB-BASED JOIN FRAMEWORK ABSTRACT: In this paper, we propose a new type of Dictionary-based Entity Recognition Problem, named Approximate Membership Localization (AML). The popular Approximate Membership Extraction (AME) provides a full coverage to the true matched substrings from a given document, but many redundancies cause a low efficiency of the AME process and deteriorate the performance of real-world applications using the extracted substrings. The AML problem targets at locating non overlapped substrings which is a better approximation to the true matched substrings without generating overlapped redundancies. In order to perform AML efficiently, we propose the optimized algorithm P-Prune that prunes a large part of overlapped redundant matched substrings before generating them.
    2013-12-15 16:45:53下载
    积分:1
  • 这是关于DES算法的C / C++实现的一个例子
    这是一关于DES加密算法的C/C++实现范例-This is the one on the DES encryption algorithm C/C++ Realize Example
    2022-07-25 21:47:24下载
    积分:1
  • 使用BCB5开发的一个简单的3DES演示,文件是用文潜水…
    使用的是BCB5开发的一个简单的3DES的DEMO,对文件采用的是密文挪用来处理短块。-Using BCB5 developed a simple 3DES of DEMO, the document is used ciphertext diverted to deal with the short block.
    2023-03-18 18:15:03下载
    积分:1
  • Ibe_ext
    IBE基于身份的加密系统的身份提取程序,使用VC6.0开发,即把身份转换成椭圆曲线上的点(IBE identity-based encryption system of the identity of extraction procedures, using VC6.0 development, namely, the identity into a point on the elliptic curve)
    2020-06-29 20:40:02下载
    积分:1
  • 这是一个算法,我自己也看不懂,发上来大家看一下
    这是一个加密算法,我自己也看不懂,发上来大家看一下-This is an encryption algorithm, I, for one can not read, the U.S. authorities to look at
    2023-05-01 20:50:03下载
    积分:1
  • 696518资源总数
  • 105885会员总数
  • 31今日下载