-
h2
将天骄2服务端的加密文本文件与生成的软件放在同一目录下,点击批量转换,
完成后会在同目录下生成一个名为temp的文件夹,其中存放的就是转换后的文件.
因为加密和解密的规则完全相同,所以加密过程和解密过程相同,
也就是说如果原来的文件存放的是原文,转换后就会生成密文,如果原来是密文,转换后生成原文.
适用于天骄2,凤舞天骄的所有版本服务端.(The the Tianjiao 2 server encrypted text file in the same directory with the generated software, click on the batch conversion finished, it will generate a folder named temp in the same directory, which store the converted file encryption and decryption rules are identical, so the encryption and decryption process is the same, that is to say if the original file is stored in the original conversion will generate the ciphertext, if the original ciphertext, conversion generated text. apply to tianjiao, all of Fung Mo tianjiao, the version of the server.)
- 2013-04-27 11:47:04下载
- 积分:1
-
MD5 HASH摘要算法,采用C语言开发
MD5 HASH摘要算法,采用C语言开发-MD5 HASH digest algorithm using C language development
- 2022-01-26 04:07:14下载
- 积分:1
-
Arnold1
用matlab实现的图像加密算法-基于Arnold变换的图像加密(using Matlab achieve image encryption algorithm-based Arnold Transform Image Encryption)
- 2005-06-23 18:07:33下载
- 积分:1
-
这个是一款不错的文件加密软件,能让你的隐私文件受到严密的保护....
这个是一款不错的文件加密软件,能让你的隐私文件受到严密的保护.-this is a good document encryption software that can make your documents to be subject to stringent privacy protection.
- 2022-05-22 23:01:49下载
- 积分:1
-
AES Rijndael fast security system to encrypt and deycrypt information
AES Rijndael fast security system to encrypt and deycrypt information
- 2022-03-18 16:38:11下载
- 积分:1
-
AML-Efficient-Approximate-Membership
AML EFFICIENT APPROXIMATE MEMBERSHIP LOCALIZATION WITHIN A WEB-BASED JOIN FRAMEWORK ABSTRACT: In this paper, we propose a new type of Dictionary-based Entity Recognition Problem, named Approximate Membership Localization (AML). The popular Approximate Membership Extraction (AME) provides a full coverage to the true matched substrings from a given document, but many redundancies cause a low efficiency of the AME process and deteriorate the performance of real-world applications using the extracted substrings. The AML problem targets at locating non overlapped substrings which is a better approximation to the true matched substrings without generating overlapped redundancies. In order to perform AML efficiently, we propose the optimized algorithm P-Prune that prunes a large part of overlapped redundant matched substrings before generating them.
- 2013-12-15 16:45:53下载
- 积分:1
-
DES加密算法及有关说明(HTM)
DES加密算法及有关说明(HTM)-DES encryption algorithm and the (HTM)
- 2022-02-02 19:39:09下载
- 积分:1
-
Random_Phrase_Encryption_based_on_4f_sys
说明: 基于4f系统的双随机相位编码,matlab实现,用于图像加密(4f systems based on double random phase encoding, matlab realization for image encryption)
- 2009-07-23 09:59:11下载
- 积分:1
-
1. This program will all possible symbols in English and in the definition of th...
1.本程序将所有可能出现的英文和符号定义在ASCII表中的“000--255”中的256个常用字符
2.在实现2的基础上,实现控制台对英文文本文件(注意明文和密文都以文件形式存在)的加解密
形式:cipher 源文件名 目的文件名 密钥 E/D(标示加解密)说明:对于加密来说,源文件名就是明文,对于解密来说,源文件名就是密文-1. This program will all possible symbols in English and in the definition of the ASCII table, "000-- 2 55 "of 256 commonly used characters in two. in achieving two on the basis of Console achieve the English text files (and expressly close attention to the text of a document form) encryption forms : cipher source document file names Key E/D (marked increase declassified) Note : For encryption, source file name is expressly for declassification, the source file name is ciphertext
- 2022-05-25 21:59:44下载
- 积分:1
-
Simple steganography program written in Python. The program writes and reads inf...
Simple steganography program written in Python. The program writes and reads information to/from 24 bits bitmaps.
- 2022-02-04 00:48:35下载
- 积分:1