-
一个简单的数据加密程序转变思想,因为uppercas…
一个用移位思想实现的简单数据加密程序,因为不论是大写还是小写字母,其ASC码值都是按顺序排列的.故可以用相对应的ASC码值进行判断以及算法实现.-a shift ideology with a simple data encryption procedures, because both uppercase or lowercase letters, the value of ASC codes are arranged in chronological order according to the. It can be used to be the relative value of ASC code of judgment and algorithm.
- 2022-06-30 16:11:37下载
- 积分:1
-
密钥盘生成程序,附使用说明
密钥盘生成程序,附使用说明-Key disk generation process, with the use of
- 2022-07-09 16:35:34下载
- 积分:1
-
RC4 encryption algorithm to achieve in VB
rc4加密算法在VB中实现-RC4 encryption algorithm to achieve in VB
- 2022-01-26 05:19:48下载
- 积分:1
-
Rijndael,实现AES的算法,附带了源代码和flash演示文件,讲解的很详细!...
Rijndael,实现AES的算法,附带了源代码和flash演示文件,讲解的很详细!-Rijndael, the AES algorithm realize, comes with source code and the flash presentation to explain the great detail!
- 2022-04-19 16:21:12下载
- 积分:1
-
Cryptography
计算机密码学
经典密码学书籍,含很多算法的标准实现代码(Cryptography book including many standard codes for some cryptographic algorithms. recommended. )
- 2010-08-13 16:48:04下载
- 积分:1
-
DES与RSA算法的解析与推演。不是单纯理论的讲解,带着一些应用的角度让对密码学有兴趣的人能很容易理解略显深奥的密码算法。...
DES与RSA算法的解析与推演。不是单纯理论的讲解,带着一些应用的角度让对密码学有兴趣的人能很容易理解略显深奥的密码算法。-DES and RSA algorithms with analytic deduction. Not purely theoretical explanations, with the perspective of some applications of cryptography to allow those who are interested can easily understand the slightly esoteric cipher.
- 2022-02-02 05:23:43下载
- 积分:1
-
AML-Efficient-Approximate-Membership
AML EFFICIENT APPROXIMATE MEMBERSHIP LOCALIZATION WITHIN A WEB-BASED JOIN FRAMEWORK ABSTRACT: In this paper, we propose a new type of Dictionary-based Entity Recognition Problem, named Approximate Membership Localization (AML). The popular Approximate Membership Extraction (AME) provides a full coverage to the true matched substrings from a given document, but many redundancies cause a low efficiency of the AME process and deteriorate the performance of real-world applications using the extracted substrings. The AML problem targets at locating non overlapped substrings which is a better approximation to the true matched substrings without generating overlapped redundancies. In order to perform AML efficiently, we propose the optimized algorithm P-Prune that prunes a large part of overlapped redundant matched substrings before generating them.
- 2013-12-15 16:45:53下载
- 积分:1
-
SecurityLib一个user
SecurityLib一个user-rights系统控件,有很多功能,如口令加密等-SecurityLib a user-rights system of controls, there are many features such as password encryption
- 2023-04-23 10:10:03下载
- 积分:1
-
防盗decryot软件
Immobilizer decryot software
- 2022-03-30 21:34:49下载
- 积分:1
-
CRC校验中叠加和校验方法的生成,校验等功能函数源码。
CRC校验中叠加和校验方法的生成,校验等功能函数源码。-CRC verification and validation methods of superposition generation, calibration source, such as performance function.
- 2022-08-08 20:23:21下载
- 积分:1