-
Ibe_ext
IBE基于身份的加密系统的身份提取程序,使用VC6.0开发,即把身份转换成椭圆曲线上的点(IBE identity-based encryption system of the identity of extraction procedures, using VC6.0 development, namely, the identity into a point on the elliptic curve)
- 2020-06-29 20:40:02下载
- 积分:1
-
SM4
sm4国密对称算法源码和使用sample,请参考。。(sm4 source code sample)
- 2016-01-16 12:08:00下载
- 积分:1
-
h2
将天骄2服务端的加密文本文件与生成的软件放在同一目录下,点击批量转换,
完成后会在同目录下生成一个名为temp的文件夹,其中存放的就是转换后的文件.
因为加密和解密的规则完全相同,所以加密过程和解密过程相同,
也就是说如果原来的文件存放的是原文,转换后就会生成密文,如果原来是密文,转换后生成原文.
适用于天骄2,凤舞天骄的所有版本服务端.(The the Tianjiao 2 server encrypted text file in the same directory with the generated software, click on the batch conversion finished, it will generate a folder named temp in the same directory, which store the converted file encryption and decryption rules are identical, so the encryption and decryption process is the same, that is to say if the original file is stored in the original conversion will generate the ciphertext, if the original ciphertext, conversion generated text. apply to tianjiao, all of Fung Mo tianjiao, the version of the server.)
- 2013-04-27 11:47:04下载
- 积分:1
-
ASFDSAF
题目:某个公司采用公用电话传递数据,数据是四位的整数,在传递过程中是加密的,加密规则如下:
每位数字都加上5,然后用和除以10的余数代替该数字,再将第一位和第四位交换,第二位和第三位交换。
1.程序分析:
2.程序源代码:(Topic: a company USES the public telephone relay data, data is four integers, in the relay in the process is encrypted, encryption rules are as follows:
Each Numbers add 5, then use and divided by the number of 10 instead of a remnant, then the first and fourth exchange, the second and third exchange.
1. The program analysis:
2. The source code:)
- 2012-05-26 20:07:28下载
- 积分:1
-
sign
对于ECC 进行加密解密运算,这里主要是ECDSA的签名(For ECC encryption and decryption operations, where mainly ECDSA signature)
- 2020-07-03 20:00:01下载
- 积分:1
-
vc694557882444
说明: 用visual c++ 写的des加密算法演示
(with visual c write des encryption algorithm demo)
- 2006-05-13 07:38:18下载
- 积分:1
-
houfangjiaohui
空间后方交会,摄影测量学的重要程序,通过共线方程解算加密点,是摄影测量学的经典算法(Space Resection the photogrammetry important program through the collinear equation solver encryption point photogrammetry classical algorithm)
- 2013-03-21 20:36:30下载
- 积分:1
-
bl_des_test
使用dll,将vc下进行文件加解密的blowfish方法做成dll文件,从而在vc中调用,隐藏加解密的参变量。(Using dll, under the vc the blowfish file encryption method made dll file, so call in vc, the hidden variable encryption and decryption of the parameters.)
- 2010-08-30 18:56:22下载
- 积分:1
-
dogsn
rockey6加密狗
dogsn名称为3000(dogsn3000)
- 2010-06-29 00:12:28下载
- 积分:1
-
DES-disk-system
以C++语言在微机上实现了美国数据加密标准DES。可随微机软盘任意路径下的任何文件,加密,加密文件可在软、硬盘任何目录下或在网络中传送;另一方面可对软、硬盘中的任何文件进行解密,解密后的文件除在末尾多出几个空格符外与原文件完全相同,绝不影响EXE文件,COM文件或数据库文件的使用。密钥有加密者在键盘输入8个字符。(In c++ language microcomputer to U.S. data encryption standard DES. With the computer floppy disk arbitrary path of any of the files, encryption, encrypt files can be in soft, hard disk any directory or in the network transmission On the other hand, soft, hard disk to the any classify documents, the decrypted file in the end in a few more the space appears with the original documents are all the same, never affect EXE file, COM file or database files use. Key there are JiaMiZhe in keyboard input 8 characters.
)
- 2011-12-28 22:14:57下载
- 积分:1