-
CMAC
在实现AES基础上,用C编写CMAC算法并调试通过。输入数据进行CMAC验证。(In the realization of AES based on the CMAC algorithm written in C and debugging. CMAC input data validation)
- 2014-01-10 16:12:49下载
- 积分:1
-
RSAKEY
生成RSA密钥,将密钥生成后`,存入文件中(RSA key generation, key generation `stored in the file)
- 2013-04-19 15:04:54下载
- 积分:1
-
rsashuziqianming
RSA数字签名的源代码 vc++6.0实现的版本(RSA Digital Signature vc source code version 6.0)
- 2007-05-16 16:42:45下载
- 积分:1
-
openssl_aes_JIAMI
通过调用openssl库进行aes加密,本程序已编译好了openssl,无需在进行编译!生成时请引用lib文件(By calling the openssl library aes encryption, the program has compiled the openssl, without making compilation! Please cite lib files generated)
- 2013-08-26 11:30:56下载
- 积分:1
-
Hideseek_introduction
Hideseek可将秘密文件隐写到指定图片中,并可检测隐写信息,本文是对该软件的使用说明。(hide &seek to run the file through individual test run normally. Hidden secret documents can be written to the specified picture, and can detect steganographic message.)
- 2013-10-30 11:21:59下载
- 积分:1
-
sm3Phmac
基于国密算法SM3实现HMAC,输入密钥和消息,可产生HASH验证码,C环境下调试成功(Based on the countries close algorithm realization SM3 HMAC, input key and news, can produce HASH verification code, C environment debugging success)
- 2020-12-29 09:49:00下载
- 积分:1
-
0401-2
椭圆曲线密码体制及其在电子银行中的应用,对椭圆曲线的加解密应用具有很好参考价值(Elliptic curve cryptography and its application in e-banking, a good reference value of the elliptic curve encryption and decryption application
)
- 2012-04-01 09:12:53下载
- 积分:1
-
DES
DES加密算法,初始置换、密钥置换、密钥循环、密钥压缩置换、数据扩展置换、、S盒替换、P盒置换、末置换
(DES encryption algorithm, the initial replacement, key replacement, key loops, key compression replacement, data expansion permutation,, S cartridge replacement, P cartridge replacement, replacement end)
- 2021-04-05 22:19:03下载
- 积分:1
-
diban
转下的源代码程序,此程序需要密码,但可以正常使用,并可对后台进行部分修改(Transfer the source code under the program, this program requires a password, but can be used normally, it may also be part of the background changes)
- 2009-12-14 23:09:16下载
- 积分:1
-
ASFDSAF
题目:某个公司采用公用电话传递数据,数据是四位的整数,在传递过程中是加密的,加密规则如下:
每位数字都加上5,然后用和除以10的余数代替该数字,再将第一位和第四位交换,第二位和第三位交换。
1.程序分析:
2.程序源代码:(Topic: a company USES the public telephone relay data, data is four integers, in the relay in the process is encrypted, encryption rules are as follows:
Each Numbers add 5, then use and divided by the number of 10 instead of a remnant, then the first and fourth exchange, the second and third exchange.
1. The program analysis:
2. The source code:)
- 2012-05-26 20:07:28下载
- 积分:1