登录
首页 » GO » EnDeCrypt

EnDeCrypt

于 2018-05-15 发布 文件大小:5KB
0 104
下载积分: 1 下载次数: 0

代码说明:

  GO语言下的RSA,AES,DES加密解密实例(GO language under the RSA, AES, DES encryption and decryption example)

文件列表:

aes.go, 1325 , 2018-05-10
aes_test.go, 610 , 2018-05-15
des.go, 2828 , 2018-03-09
des_test.go, 910 , 2018-03-09
rsa.go, 5487 , 2018-03-09
rsa_test.go, 1466 , 2018-03-09

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • xinhundun
    这是一个自治的三维混沌系统的彩色图像加密程序,该混沌系统具有优良的动力学特性,加密效果明显有效,且抗干扰能力强,是很好的加密系统。(This is an autonomous chaotic system color image encryption procedures, the chaotic system has excellent dynamic characteristics, the effect is obvious encryption effective, and anti-interference ability, is a good encryption system.)
    2013-05-28 09:04:31下载
    积分:1
  • 16c84
    基于16C84做的智能卡程序,可以实现智能设置。-16C84-based smart card to do the procedure, you can realize the smart set.
    2022-02-06 11:45:31下载
    积分:1
  • 程序使用C++展示相当强的XOR。 当它unencrypting文件时,包括EOF验错和自动侦查。程序很好被提供并且做在串类建立的好用法。...
    程序使用C++展示相当强的XOR加密。 当它unencrypting文件时,包括EOF验错和自动侦查。程序很好被提供并且做在串类建立的好用法。-Program Uses C++ to Demonstrate A Fairly Strong XOR Encryption. Includes EOF error checking and automatic detection of when it is unencrypting a file. Program Is Documented Well And Also Makes Good Use of the Built In String Class.
    2022-12-20 10:10:03下载
    积分:1
  •  使用cryptapi的demo程序
     使用cryptapi加密的demo程序-cryptapi use encryption procedures demo
    2022-01-25 23:14:22下载
    积分:1
  • BlowFish算法的压缩源码
    BlowFish算法的压缩源码-BlowFish compression algorithm source code
    2022-03-06 04:47:06下载
    积分:1
  • 代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
    2023-06-18 10:00:03下载
    积分:1
  • vc下的pgp最新版本源码,不过没有网路功能,但还是很不错的!...
    vc下的pgp最新版本源码,不过没有网路功能,但还是很不错的!-vc pgp under the latest version of source code, but not the Internet function, but still very good!
    2022-06-01 04:03:34下载
    积分:1
  • daiti
    基本古典密码设计——周期为3的多表代替密码的设计和实现(Basic classical cipher design)
    2011-12-14 11:04:59下载
    积分:1
  • ElGamal算法
    ElGamal算法-ElGamal algorithm
    2022-07-24 16:18:08下载
    积分:1
  • hash
    网上收集的14种hash算法。希望对大家有用。(14 kinds of hash algorithm online collection)
    2014-02-25 19:44:37下载
    积分:1
  • 696524资源总数
  • 103904会员总数
  • 44今日下载