-
微狗(UMI/UMC/PMH/PMI)驱动安装程序是安装在 Windows 9X/ME/NT/2K/XP/WS2003/Vista
/XP64/WS200...
微狗(UMI/UMC/PMH/PMI)驱动安装程序是安装在 Windows 9X/ME/NT/2K/XP/WS2003/Vista
/XP64/WS2003x64/Vista64环境下的驱动的程序。- 微狗(UMI/UMC/PMH/PMI)驱动安装程序是安装在 Windows 9X/ME/NT/2K/XP/WS2003/Vista
/XP64/WS2003x64/Vista64环境下的驱动的程序。
- 2022-02-24 15:35:29下载
- 积分:1
-
MD5算法的java实现
MD5算法的java实现-The implement of MD5 algorithm for JAVA
- 2023-04-30 10:30:02下载
- 积分:1
-
java写的椭圆曲线加密(ECC)算法源码
java写的椭圆曲线加密(ECC)算法源码-java writes the elliptic curve encryption (ECC) calculates the
law origin code
- 2023-01-21 16:00:04下载
- 积分:1
-
des
用JAVA语言实现DES算法。通过文件读取进行加密,密码由客户自行输入(JAVA language used DES algorithm. Read through the document is encrypted, the password input by the customer on its own)
- 2009-07-01 11:20:44下载
- 积分:1
-
ESPU
此资料为加密芯片资料,里面有例程,是很好的资料(This data encryption chip data, there are routine, the data is good)
- 2010-12-03 16:57:14下载
- 积分:1
-
This software calculates the crc32 polynomial of a string. There is one class cC...
This software calculates the crc32 polynomial of a string. There is one class cCrc32.
- 2022-03-01 08:59:41下载
- 积分:1
-
Find the highest (maximum) and lowest (minimum) grades in an array of 25 integer...
Find the highest (maximum) and lowest (minimum) grades in an array of 25 integer grades. Print the array and print the highest and lowest grades, labeled appropriately.-Find the highest (maximum) and lowest (minimum) grades in an array of 25 integer grades. Print the array and print the highest and lowest grades, labeled appropriately.
- 2022-03-09 14:31:23下载
- 积分:1
-
PROGRAM
This method is based upon the image hiding technic into another image using LSB algorithm called as Steganography.
- 2009-03-25 14:26:22下载
- 积分:1
-
DES_Test
DES加密的MFC实现,主要包括两部分组成,有字符串加密和文件加密两种模式,实现了3DES功能,让加密更安全(including string and files by DES)
- 2013-10-28 19:46:24下载
- 积分:1
-
tablecrypt是一个文件加密工具。
TableCrypt is a file encryption utility.
The major difference with most file encryptors is that this program uses a generated table in combination with a password to encrypt a file.
This way you need 2 variables to decrypt the file. This is how it works:
Generate a 10kb table file and enter a password. The password is used to pick bytes from the table file which in their turn are used to encrypt the bytes of the inputfile with XOR encryption.
- 2022-06-18 03:20:49下载
- 积分:1