-
sha-256
sha256的签名算法,纯C实现,已验证正确,在控制台上直接运行即可,(sha256 signature algorithm, pure C implementation ,has been verified properly and can be run directly on the console.)
- 2021-04-28 16:08:43下载
- 积分:1
-
ibe_set
椭圆曲线加密算法,设置服务器一步的源代码(elliptic curve encryption algorithm, the step to set up the server source code)
- 2007-03-20 19:05:01下载
- 积分:1
-
RSA
RSA加密算法,实现对文字的加密,将文字转化成数字后用RSA原理进行加密(This is RSA encryption algorithm)
- 2013-12-01 20:17:45下载
- 积分:1
-
des
des经典加密算法,实现数据交互过程中的保密(des classical encryption algorithm, data confidentiality during the interaction)
- 2013-12-19 18:38:55下载
- 积分:1
-
aes
本程序可以实现AES16,24,32位任意长度的密码与任意长度的明文的加密与解密,并附有一实例(This procedure can achieve the AES16 24,32 password of any length and any length of plaintext encryption and decryption, with an example)
- 2021-03-15 14:09:22下载
- 积分:1
-
aes-src-22-11-16
一个用vc编写的aes算法实现,含有128,192,256三种钥匙长度的(a prepared using vc Orangk'aes algorithm, containing 128,192,256 length of the three key)
- 2006-12-05 09:17:18下载
- 积分:1
-
chaos
针对Logistic映射,实现数字图像迭代混沌加密算法()
- 2007-08-06 22:30:58下载
- 积分:1
-
Caesar-code
凯撒密码作为一种最为古老的对称加密体制,在古罗马的时候都已经很流行,他的基本思想是:通过把字母移动一定的位数来实现加密和解密。例如,如果密匙是把明文字母的位数向后移动三位,那么明文字母B就变成了密文的E,依次类推,X将变成A,Y变成B,Z变成C,由此可见,位数就是凯撒密码加密和解密的密钥。个人原创。(Caesar password as one of the most ancient symmetric encryption system in ancient Rome have been very popular, his basic idea is: by the letters move a certain number of bits to achieve encryption and decryption. For example, if the key is the number of bits of plaintext letters backward move three, the plaintext letter B into a ciphertext E, and so on, X will become Y-become a B,, and Z becomes C Thus, the median is the Caesar cipher encryption and decryption keys. Personal originality.)
- 2012-05-11 16:37:09下载
- 积分:1
-
373465435
基于VB的M5数学密码算法源码,有需要的就下载吧。(VB-based M5 mathematical algorithm source code, there is a need to download it.)
- 2013-08-13 23:07:29下载
- 积分:1
-
ECC
椭圆曲线的实现(ECC),椭圆曲线算法是代数几何、数论等多个数学分支的一个交叉点,一直被人们认为是纯理论学科。而椭圆曲线密码体制,是基于椭圆曲线离散对数问题的一种公钥密码体制(Realization of elliptic curves (ECC), elliptic curve algorithm is algebraic geometry, a number of mathematical intersection of number theory and other branches, has been considered a purely theoretical discipline. The elliptic curve cryptosystem is based on elliptic curve discrete logarithm problem as a public-key cryptosystem)
- 2014-05-09 19:32:34下载
- 积分:1