-
ShamirSharring
Shamir门限算法的C++实现,依赖于NTL开源代码库(Shamir threshold algorithm C++ implementation, relies on NTL open source code base)
- 2020-07-01 21:00:02下载
- 积分:1
-
AES_CMAC
AES加密,并完成基于AES的CAMC操作(AES encryption and the AES operation is completed based on CAMC)
- 2014-11-08 23:11:00下载
- 积分:1
-
Ibe_dec
IBE基于身份的加密系统的解密程序,使用VC6.0开发(IBE identity-based encryption system of the decryption process, using VC6.0 Development)
- 2020-06-29 20:40:02下载
- 积分:1
-
123
加密狗 HID检测工具VBS 加密狗 HID检测工具VBS加密狗 HID检测工具VBS加密狗 HID检测工具VBS加密狗 HID检测工具VBS(Encryption dog HID VBS testing tools
Encryption dog HID VBS testing tools
)
- 2015-08-27 09:41:31下载
- 积分:1
-
aes-src-22-11-16
一个用vc编写的aes算法实现,含有128,192,256三种钥匙长度的(a prepared using vc Orangk'aes algorithm, containing 128,192,256 length of the three key)
- 2006-12-05 09:17:18下载
- 积分:1
-
md5
MD5是一种被广泛使用的“消息-摘要算法”。实际上就是一个单项散列函数。(MD5 is a widely used " message- digest algorithm." Is actually a single hash function.)
- 2010-12-27 16:26:46下载
- 积分:1
-
Recursive-subroutine
该程序使用C++写的一个基于递归子程序算法的语法翻译器,是在vs2012环境下编写的,供大家参考和学习(The program uses C++ to write an algorithm based on recursive subroutine syntax interpreter is written in vs2012 environment, for your reference and learning)
- 2013-11-26 23:12:15下载
- 积分:1
-
373465435
基于VB的M5数学密码算法源码,有需要的就下载吧。(VB-based M5 mathematical algorithm source code, there is a need to download it.)
- 2013-08-13 23:07:29下载
- 积分:1
-
Vigenere
实现维吉尼亚密码,用键盘接收明文和密钥,屏幕打印密文和解密后的明文。
可以实现:大小写敏感,明文小写则密文大写,明文大写则密文小写输出,注意输入的健壮性控制,明文字符超出字符集后保留原文(Virginia to achieve the password, use the keyboard to receive the plaintext and the key, the screen printing ciphertext and the decrypted plaintext. Can be achieved: case sensitive, then the ciphertext plaintext lowercase uppercase, lowercase plaintext ciphertext output is capital, pay attention to the robustness of the control input, plaintext characters out retain the original character set)
- 2011-11-20 19:45:59下载
- 积分:1
-
ASFDSAF
题目:某个公司采用公用电话传递数据,数据是四位的整数,在传递过程中是加密的,加密规则如下:
每位数字都加上5,然后用和除以10的余数代替该数字,再将第一位和第四位交换,第二位和第三位交换。
1.程序分析:
2.程序源代码:(Topic: a company USES the public telephone relay data, data is four integers, in the relay in the process is encrypted, encryption rules are as follows:
Each Numbers add 5, then use and divided by the number of 10 instead of a remnant, then the first and fourth exchange, the second and third exchange.
1. The program analysis:
2. The source code:)
- 2012-05-26 20:07:28下载
- 积分:1