-
Flexnet-Trusted-Storage-based_PR_TS_V11.9.1
FlexNet Publisher 11.9.1
Trusted Storage-based Licensing Programming Reference
- 2012-01-07 18:45:44下载
- 积分:1
-
MD5
MD5算法描述(略)。
设计一个模拟的系统用户安全登录界面,采用MD5算法实现用户登录口令的安全认证。要求模拟界面至少具有用户口令文件的注册和用户登录时输入的口令是否正确的结果提示两个功能。
(MD5 algorithm description (abbreviated). The design of a simulation system security log user interface, using MD5 algorithm users log on password security authentication. Analog interface requirements at least a registered user password files and user login password is entered when the correct results suggest that the two functions.)
- 2008-06-23 11:13:42下载
- 积分:1
-
DES
VC编写的简单DES加密程序,密钥由用户手动输入,可加密字符串(VC prepared by the simple DES encryption program, the key to manually input by the user)
- 2014-07-28 22:45:11下载
- 积分:1
-
jiajiemi
加解密算法的实现,内部包含有多个加解密算法的实现,(Encryption and decryption algorithm, contains a number of internal encryption algorithm,)
- 2009-06-14 15:09:55下载
- 积分:1
-
hundunjiami
说明: 一个关于加密音频,图像的VB程序,功能还算可以,希望可以帮到人!!(One on encryption of audio, images VB program, function OK, the desire to help people! !)
- 2021-02-28 17:49:35下载
- 积分:1
-
aes
aes源码。加密的高级标准。。。。。。。。。。(aes)
- 2010-09-19 09:29:27下载
- 积分:1
-
ResOrg_src
AES128bit加密算法。在PDF文档中有详细算法描述(AES128bit encryption algorithm. PDF documents are detailed in the algorithm description)
- 2011-09-06 13:01:42下载
- 积分:1
-
sign
对于ECC 进行加密解密运算,这里主要是ECDSA的签名(For ECC encryption and decryption operations, where mainly ECDSA signature)
- 2020-07-03 20:00:01下载
- 积分:1
-
123
加密狗 HID检测工具VBS 加密狗 HID检测工具VBS加密狗 HID检测工具VBS加密狗 HID检测工具VBS加密狗 HID检测工具VBS(Encryption dog HID VBS testing tools
Encryption dog HID VBS testing tools
)
- 2015-08-27 09:41:31下载
- 积分:1
-
h2
将天骄2服务端的加密文本文件与生成的软件放在同一目录下,点击批量转换,
完成后会在同目录下生成一个名为temp的文件夹,其中存放的就是转换后的文件.
因为加密和解密的规则完全相同,所以加密过程和解密过程相同,
也就是说如果原来的文件存放的是原文,转换后就会生成密文,如果原来是密文,转换后生成原文.
适用于天骄2,凤舞天骄的所有版本服务端.(The the Tianjiao 2 server encrypted text file in the same directory with the generated software, click on the batch conversion finished, it will generate a folder named temp in the same directory, which store the converted file encryption and decryption rules are identical, so the encryption and decryption process is the same, that is to say if the original file is stored in the original conversion will generate the ciphertext, if the original ciphertext, conversion generated text. apply to tianjiao, all of Fung Mo tianjiao, the version of the server.)
- 2013-04-27 11:47:04下载
- 积分:1