登录
首页 » Visual C++ » cryptopp552

cryptopp552

于 2007-10-17 发布 文件大小:969KB
0 193
下载积分: 1 下载次数: 132

代码说明:

  加密算法RSA,DSA等,用C++实现,内附加有详细的说明(Encryption algorithm RSA, DSA, etc., using C++ Realize, with additional detail has)

文件列表:

3desval.dat
3way.cpp
3way.h
3wayval.dat
adhoc.cpp.proto
adler32.cpp
adler32.h
aes.h
algebra.cpp
algebra.h
algparam.cpp
algparam.h
arc4.cpp
arc4.h
argnames.h
asn.cpp
asn.h
base32.cpp
base32.h
base64.cpp
base64.h
basecode.cpp
basecode.h
bench.cpp
bench.h
bench2.cpp
bfinit.cpp
blowfish.cpp
blowfish.h
blumshub.cpp
blumshub.h
camellia.cpp
camellia.dat
camellia.h
cast.cpp
cast.h
cast128v.dat
cast256v.dat
casts.cpp
cbcmac.cpp
cbcmac.h
channels.cpp
channels.h
config.h
cpu.cpp
cpu.h
crc.cpp
crc.h
cryptdll.dsp
cryptdll.vcproj
cryptest.dsp
cryptest.dsw
cryptest.sln
cryptest.vcproj
cryptest_bds.bdsgroup
cryptest_bds.bdsproj
cryptest_bds.bpf
cryptlib.cpp
cryptlib.dsp
cryptlib.h
cryptlib.vcproj
cryptlib_bds.bdsproj
cryptlib_bds.cpp
cryptopp.rc
datatest.cpp
default.cpp
default.h
des.cpp
des.h
descert.dat
dessp.cpp
dh.cpp
dh.h
dh1024.dat
dh2.cpp
dh2.h
dh2048.dat
dlie1024.dat
dlie2048.dat
dll.cpp
dll.h
dlltest.cpp
dlltest.dsp
dlltest.vcproj
dmac.h
Doxyfile
dsa.cpp
dsa.h
dsa1024.dat
dsa1024b.dat
dsa512.dat
ec2n.cpp
ec2n.h
eccrypto.cpp
eccrypto.h
ecp.cpp
ecp.h
elgamal.cpp
elgamal.h
elgc1024.dat

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • EC-Signature
    基于miracl大数库的椭圆曲线EC的签名算法的c语言实现(Database based on large numbers miracl elliptic curve signature algorithm EC for c-language implementation)
    2020-07-03 18:40:02下载
    积分:1
  • SM3,SM4_UI
    将国密算法SM3, SM4 ECB的C代码打包成dll库。 然后在C#中进行调用。 有输入输出接口,测试结果正确。 包含所有源代码,可在此基础上进一步开发(The C code of the Chinese national algorithm SM3, SM4 ECB is packaged into a dll library and then called in C# with input and output interfaces. The test result is correct. Contains all source code and can be further developed on this basis)
    2020-11-17 01:49:39下载
    积分:1
  • wugacsp 非对称钥的生成、导入、导出、
    这两个工程主要用CSP 1、CSPTEST 写的比较乱 主要是给当时一个朋友做参考调用的 完成非对称密钥的生成、导入、导出、加密、解密、对称的加密解密、签名、验证。 2、CSTTEST2 写的比前个好些,但是平时上班,下班自己也要写论文,所以花的时间也不太多,很多地方都偷懒了。比如文件大小我没有用NEW 而且指定了1024 有需要的朋友可以自己修改。这个工程主要是非对称的密钥的导出和导入,还有就是会话密钥的操作。(these two works mainly with a CSP. CSPTEST comparison was made mainly to the chaos when a friend called to refer to the completion of the non-symmetric key generation, importing and exporting, encryption, decryption, symmetric encryption and decryption, signature, the certification. 2, CSTTEST2 write better than in the previous months, but usually go to work and finish their own toilet paper so I spent the time is not too much, all of the lazy. For instance, file size I have not used the NEW 1024 and designated a need to amend their friends. The project mainly non-symmetric keys to the Export and Import, there is the session key operation.)
    2020-06-27 10:00:02下载
    积分:1
  • transparent-encryption
    基于双缓冲过滤驱动的透明加密系统研究与实现(Based on double buffer transparent encryption system filter driver and Implementation Research)
    2011-11-19 21:06:54下载
    积分:1
  • AES-CMAC
    能够实现AES加密解密的功能,已经过测试可以使用(Enables AES encryption and decryption functions, have been tested can be used)
    2015-05-07 00:12:18下载
    积分:1
  • File-Encryption
    文件加密器,实现对文件加密,用来学习的代码(File encryption, encrypting files, the code used to study)
    2012-05-20 14:28:54下载
    积分:1
  • softKey-yutian-vb
    自己写的域天加密狗VB使用小例子,32位的加密狗快速开发源代码(Write your own domain days dongle VB use a small example, 32 dongle rapid development of source code)
    2012-09-11 17:29:31下载
    积分:1
  • MD5SHA1
    md5及sha-1算法及验证文件,vc6.0调试无误(md5 and sha-1 algorithm and verification documents, vc6.0 debug and correct)
    2009-09-18 09:02:34下载
    积分:1
  • diban
    转下的源代码程序,此程序需要密码,但可以正常使用,并可对后台进行部分修改(Transfer the source code under the program, this program requires a password, but can be used normally, it may also be part of the background changes)
    2009-12-14 23:09:16下载
    积分:1
  • duobiaotidai
    一个周期3的多表代替密码,第1个表由密钥字法产生(密钥字自拟),第2个表由洗牌法产生(注意,字母a~z与数字0~25一一对应),第三个表由公式法产生(数学公式自拟,注意它须是Z26上的一个一一变换)(a cycle of three multi-table instead of passwords, a table by key word method, (key word from the intended), Table No. 2 produced by shuffling method (note, a letter with a number of z ~ 0 ~ 25 he gathers), 3rd tables generated by the formula (from the proposed mathematical formula, it should pay attention to the Z26 is a transformation on January 1))
    2006-10-10 17:33:56下载
    积分:1
  • 696518资源总数
  • 105949会员总数
  • 22今日下载