登录
首页 » Visual C++ » CUDA-AES

CUDA-AES

于 2014-04-11 发布 文件大小:2694KB
0 188
下载积分: 1 下载次数: 24

代码说明:

  基于CUDA的AES快速加密解密文档,系统介绍饿AES算法的设计与优化(CUDA-based AES encryption and decryption of documents quickly, the system introduced hungry AES algorithm design and optimization)

文件列表:

基于CUDA并行架构AES算法的研究与实现.pdf,2808461,2014-03-08

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 3des-suanfa
    3des算法code,已经通过visual c++编译.比一重des算法更加可靠!(3DES algorithm code, has passed visual c++ Compiler. Than one algorithm more reliable re-des!)
    2008-04-16 23:17:57下载
    积分:1
  • fangsemima
    仿射密码体制加解密,较移位代换等加解密体制,更加优越。(Affine cipher encryption and decryption, a shift substitution and encryption and decryption system, more superior.)
    2011-12-19 19:58:14下载
    积分:1
  • Flexnet-Trusted-Storage-based_PR_TS_V11.9.1
    FlexNet Publisher 11.9.1 Trusted Storage-based Licensing Programming Reference
    2012-01-07 18:45:44下载
    积分:1
  • delcert
    删除系统某存储区中的证书, 代码参考msdn(removal system of a storage area of the certificate, a code reference VARIANT)
    2005-07-20 10:17:59下载
    积分:1
  • md5_cPP
    VC++下MD5运行和使用示例,可以正常使用MD5算法(VC MD5)
    2015-08-11 10:15:02下载
    积分:1
  • RC4
    流密码中RC4算法的加密解密的c程序实现(stream cipher)
    2010-06-02 14:20:47下载
    积分:1
  • Rijndael_ECB
    AES加解密C语言源代码,可直接运行通过,方便大家借鉴学习(AES encryption and decryption of C language source code, can be directly run by, we facilitate learning from)
    2013-12-01 14:14:35下载
    积分:1
  • MD5-encrypt
    使用MD5算法对数据和文件进行加密,信息安全(Using the MD5 algorithm to encrypt the data and documents, information security)
    2011-07-01 16:35:18下载
    积分:1
  • RSA
    自己写的一份RSA算法。可正常执行。控制台程序。(Write your own copy of the RSA algorithm. Can be performed normally. Console program.)
    2013-10-21 00:34:18下载
    积分:1
  • ASFDSAF
    题目:某个公司采用公用电话传递数据,数据是四位的整数,在传递过程中是加密的,加密规则如下:     每位数字都加上5,然后用和除以10的余数代替该数字,再将第一位和第四位交换,第二位和第三位交换。 1.程序分析: 2.程序源代码:(Topic: a company USES the public telephone relay data, data is four integers, in the relay in the process is encrypted, encryption rules are as follows: Each Numbers add 5, then use and divided by the number of 10 instead of a remnant, then the first and fourth exchange, the second and third exchange. 1. The program analysis: 2. The source code:)
    2012-05-26 20:07:28下载
    积分:1
  • 696518资源总数
  • 106161会员总数
  • 5今日下载