登录
首页 » Delphi » Enkripsi

Enkripsi

于 2012-10-01 发布 文件大小:168KB
0 206
下载积分: 1 下载次数: 4

代码说明:

  encrypt and descrypt

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • CRC校验中叠和校验方法的生成,校验等功能函数源码。
    CRC校验中叠加和校验方法的生成,校验等功能函数源码。-CRC verification and validation methods of superposition generation, calibration source, such as performance function.
    2022-08-08 20:23:21下载
    积分:1
  • 汇编内核的MD5算法C源码,核心运算部分采用汇编语言编写,执行高效。VC++环境开发,由于直接在C代码中直接嵌入汇编,因此可无须另外设置,可直接使用。...
    汇编内核的MD5算法C源码,核心运算部分采用汇编语言编写,执行高效。VC++环境开发,由于直接在C代码中直接嵌入汇编,因此可无须另外设置,可直接使用。
    2022-03-22 03:23:16下载
    积分:1
  • MD5 algorithm is a detailed description, it is easy to understand, gives a clear...
    MD5算法的详细介绍,很容易理解,给人豁然开朗的感觉-MD5 algorithm is a detailed description, it is easy to understand, gives a clear insight into feelings
    2022-05-06 00:00:25下载
    积分:1
  • 网络新手学习的好教程
    网络新手学习的好教程-Network novice to learn a good tutorial
    2022-04-28 01:36:28下载
    积分:1
  • 本文介绍了在JAVA环境下如何实现IDEA对称算法。由于电子商务和电子政务的普及,安全技术在其中应用非常广泛,对安全技术的要求也很高。目前在JAVA...
    本文介绍了在JAVA环境下如何实现IDEA对称加密算法。由于电子商务和电子政务的普及,安全加密技术在其中应用非常广泛,对安全加密技术的要求也很高。目前在JAVA环境下实现IDEA加密具有很多的优势,因为JAVA是基于面向对象的编程语言,并且由于它的平台无关性能被大量应用于Internet的开发。-This paper presents the Java environment IDEA how to achieve symmetric encryption algorithm. As e-commerce and e-government popular, security encryption technology, which is widely used for security encryption technology requirements is also high. In Java environment under IDEA encryption has many advantages, because Java is based on object-oriented programming language, and because it is platform independent performance was widely used in Internet development.
    2022-05-08 18:12:15下载
    积分:1
  • 硬件求平方根
    硬件求解平方根源代码加密 (硬件求解平方根的,将license添加到原有的MaxplusII或QuartusII的license中就可以直接使用,但源代码加密。altera提供 )(solving square root of the hardware encryption code (square root of the hardware solution will be added to the original license MaxplusII or Quartus II of the license which can be directly used, but the source code encryption. ALTERA provide))
    2004-10-05 11:06:50下载
    积分:1
  • document to another, encrypted document to another document, document encryption...
    文件加码,文件加密文件加 码,文件加密文件加码,文件加密-document to another, encrypted document to another document, document encryption coded document, document encryption document to another, Encryption document to another, encrypted document to another document, document encryption
    2022-04-06 09:20:38下载
    积分:1
  • veccross
    C network programming this source is vectorcross
    2009-07-05 19:38:20下载
    积分:1
  • transparent-encryption
    基于双缓冲过滤驱动的透明加密系统研究与实现(Based on double buffer transparent encryption system filter driver and Implementation Research)
    2011-11-19 21:06:54下载
    积分:1
  • 39.3
    说明:  编制程序,将输入的一行字符以加密的形式输出,然后将其解密,解密的字符串序列与输入的正文相比较,吻合时输出解密的正文,否则解密失败。 加密时,将每个字符的ascii码依次反复加上“4962873”中的数字,并在32(‘’)~122(‘z’)之间作模运算。解密与加密的顺序相反。例如输入正文“the result of 3 and 2 is not 8” 结果为: (Programming, the input line character output in an encrypted form, and then decrypted, the decrypted text sequence of characters compared with the input, output to decrypt the body of the agreement, otherwise the decryption failed. Encryption, ascii code of each character in turn repeatedly with &quot 4962873&quot in the figures, and 32 (' ' )~ 122 (' z' ) as a model between the operations. Decryption and encryption in reverse order. For example, enter the text &quot the result of 3 and 2 is not 8&quot results:)
    2011-04-05 08:43:48下载
    积分:1
  • 696518资源总数
  • 106182会员总数
  • 24今日下载