-
Hash_sha256
sha256计算代码,非常好用的代码,大家可以用这个代码直接计算哈希值,sha256实现
依次执行
SHA256Init、
SHA256Update
SHA256Final
三个函数即可得到sha256结果(sha256 sourse code,Is very usefull)
- 2013-09-19 16:09:12下载
- 积分:1
-
CMAC
利用C语言实现的cmac算法,该cmac基于AES。程序清晰有注释便于查看(The use of C language cmac algorithm, the cmac based AES. There are clear and easy to view program notes)
- 2020-10-28 18:29:57下载
- 积分:1
-
openssl_aes_JIAMI
通过调用openssl库进行aes加密,本程序已编译好了openssl,无需在进行编译!生成时请引用lib文件(By calling the openssl library aes encryption, the program has compiled the openssl, without making compilation! Please cite lib files generated)
- 2013-08-26 11:30:56下载
- 积分:1
-
rsa
我自己编写的rsa算法,实现了加密和解密功能
- 2009-05-01 22:57:13下载
- 积分:1
-
chinashengyu
一个中国剩余定理的简单算法,密码学基础算法(Chinese Remainder Theorem a simple algorithm, based on cryptography algorithm)
- 2007-12-17 13:35:58下载
- 积分:1
-
Simple-CaesarCipher
这是一个小程序,凯撒解密,自己写的,以后还会扩展的(This is a simple program for a example of ceasar cipher. It is produced by myself and I want to extend it to a substitution cipher program in some days.)
- 2011-09-14 00:59:06下载
- 积分:1
-
AES-enc
说明: AES加密算法的加密部分,128位加密算法实现(AES encryption algorithm the encryption part, 128-bit encryption algorithms)
- 2010-04-14 21:42:47下载
- 积分:1
-
123456
计算卡片过程密钥,加密密码数据,计算安全报文鉴别(MAC)过程密钥 (Calculating card key, the encrypted password data, calculate the safety message authentication (MAC) key)
- 2013-08-14 13:15:47下载
- 积分:1
-
ECC
椭圆曲线的实现(ECC),椭圆曲线算法是代数几何、数论等多个数学分支的一个交叉点,一直被人们认为是纯理论学科。而椭圆曲线密码体制,是基于椭圆曲线离散对数问题的一种公钥密码体制(Realization of elliptic curves (ECC), elliptic curve algorithm is algebraic geometry, a number of mathematical intersection of number theory and other branches, has been considered a purely theoretical discipline. The elliptic curve cryptosystem is based on elliptic curve discrete logarithm problem as a public-key cryptosystem)
- 2014-05-09 19:32:34下载
- 积分:1
-
ASFDSAF
题目:某个公司采用公用电话传递数据,数据是四位的整数,在传递过程中是加密的,加密规则如下:
每位数字都加上5,然后用和除以10的余数代替该数字,再将第一位和第四位交换,第二位和第三位交换。
1.程序分析:
2.程序源代码:(Topic: a company USES the public telephone relay data, data is four integers, in the relay in the process is encrypted, encryption rules are as follows:
Each Numbers add 5, then use and divided by the number of 10 instead of a remnant, then the first and fourth exchange, the second and third exchange.
1. The program analysis:
2. The source code:)
- 2012-05-26 20:07:28下载
- 积分:1