登录
首页 » Visual Basic » VB_CalculateMD5_UseWinAPI

VB_CalculateMD5_UseWinAPI

于 2013-10-09 发布 文件大小:3KB
0 238
下载积分: 1 下载次数: 2

代码说明:

  VB6.0调用Windows系统的API计算MD5码。这个代码跟网上流行的代码相比,具有代码简洁,维护方便,运行效率高等优点。运行速度比用纯VB6实现的快得多。(VB6.0- Call Windows system API calculate MD5 code. This code is compared with the popular online code, with code simple, easy maintenance, high efficiency. Runs faster than pure VB6 realize faster.)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • Paillier
    一种加密算法,可以直接对密文进行操作,而不需要知道相应的明文。(homomorphic encryption)
    2013-03-19 08:57:30下载
    积分:1
  • CMAC
    在实现AES基础上,用C编写CMAC算法并调试通过。输入数据进行CMAC验证。(In the realization of AES based on the CMAC algorithm written in C and debugging. CMAC input data validation)
    2014-01-10 16:12:49下载
    积分:1
  • rsa
    RSA算法,主要讲述算法的原理和过程,设计到加密解密,和溢出处理,初级学习RSA用(RSA algorithm, the algorithm mainly about the principle and process design to the encryption and decryption, and overflow processing, the primary study used RSA)
    2010-10-25 10:31:04下载
    积分:1
  • 3DES-CPP
    3des加密解密,des加密解密该算法通过编译,可以直接使用。(3DES encryption and decryption algorithms.)
    2014-02-07 15:40:00下载
    积分:1
  • Packers-prepare-yourself-of-VC
    自己动手写加壳程序,按照文档一步一步来,做你自己的加壳程序!(Packers to write himself, according to the document step by step, do your own packers!)
    2013-11-18 20:15:44下载
    积分:1
  • shiftcipher
    shiftcipher加密解密算法实例 使用shiftcipher算法加密字符串 可输入任意密钥(shiftcipher examples of encryption and decryption algorithms String encryption algorithm using the shiftcipher Can enter any key)
    2009-09-15 13:28:54下载
    积分:1
  • transparent-encryption
    基于双缓冲过滤驱动的透明加密系统研究与实现(Based on double buffer transparent encryption system filter driver and Implementation Research)
    2011-11-19 21:06:54下载
    积分:1
  • 39.3
    说明:  编制程序,将输入的一行字符以加密的形式输出,然后将其解密,解密的字符串序列与输入的正文相比较,吻合时输出解密的正文,否则解密失败。 加密时,将每个字符的ascii码依次反复加上“4962873”中的数字,并在32(‘’)~122(‘z’)之间作模运算。解密与加密的顺序相反。例如输入正文“the result of 3 and 2 is not 8” 结果为: (Programming, the input line character output in an encrypted form, and then decrypted, the decrypted text sequence of characters compared with the input, output to decrypt the body of the agreement, otherwise the decryption failed. Encryption, ascii code of each character in turn repeatedly with &quot 4962873&quot in the figures, and 32 (' ' )~ 122 (' z' ) as a model between the operations. Decryption and encryption in reverse order. For example, enter the text &quot the result of 3 and 2 is not 8&quot results:)
    2011-04-05 08:43:48下载
    积分:1
  • Main
    二进制文件操作工具 可以对二进制文件合并、分拆、加密、解密的工具,再对两个可执行文件进行合并后,显示第一个文件的信息,并且正常使用,第二个被忽略。(Binary file binary file manipulation tools can merge, split, encrypt, decrypt tool, and then the merger of two executable files, show the first file, and normal use, the second is ignored.)
    2010-10-25 00:06:53下载
    积分:1
  • Classical-cryptography
    密码技术实验一经典密码学实验维多利亚密码加密解密(Password technological experiments classic cryptography experimental Victoria password encryption and decryption)
    2012-09-03 21:18:45下载
    积分:1
  • 696518资源总数
  • 106161会员总数
  • 5今日下载