登录
首页 » C++ Builder » ecc

ecc

于 2020-12-21 发布 文件大小:58KB
0 222
下载积分: 1 下载次数: 24

代码说明:

  ecc加密算法,通过c语言实现。希望有帮助(ecc c++)

文件列表:

ok
..\aes.c,10389,2013-11-21
..\aes.h,717,2013-11-21
..\ecc.c,18039,2013-11-21
..\ecc.h,5612,2013-12-07
..\ecc_f2m.c,33094,2013-12-07
..\ecc_fp.c,24003,2013-12-07
..\ecc_test.c,14839,2013-11-21
..\ecc_test.dsp,3759,2013-11-08
..\ecc_test.dsw,522,2013-09-28
..\ecc_test.ncb,115712,2013-12-07
..\ecc_test.opt,54784,2013-12-07
..\ecc_test.plg,1682,2013-12-07
..\Makefile,188,2013-11-14
..\readme.txt,360,2013-12-07
..\zigbee.c,5504,2013-12-07
..\zigbee.h,889,2013-12-07

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • WindowsFormsApplication2
    说明:  采用轮询机制,对数据库中数据进行加密处理(Using polling mechanism to encrypt data in database)
    2020-06-18 14:20:01下载
    积分:1
  • IDEA
    说明:  idea算法VC++源码,包含系列文件 idea.h idea.cpp ideadlg.h ideadlg.cpp resource.h stdafx.h stdafx.c(idea algorithm VC++ source, including the series of documents idea.hidea.cppideadlg.hideadlg.cppresource.hstdafx.hstdafx.c)
    2008-10-30 16:37:00下载
    积分:1
  • AES
    实现在WP端silverlight的AES加密采用ECB加密方式和paddingpkcs#5的填充方式。 silverlight中的AESmanaged只有CBC加密方式和paddingpkcs#7的填充方式。(Achieve the WP side silverlight ECB encryption using AES encryption methods and paddingpkcs# 5 is filled. silverlight in AESmanaged only CBC encryption mode and paddingpkcs# 7 is filled.)
    2021-01-21 18:48:45下载
    积分:1
  • md5_cPP
    VC++下MD5运行和使用示例,可以正常使用MD5算法(VC MD5)
    2015-08-11 10:15:02下载
    积分:1
  • AES-with-ECC
    本文使用ECC加密AES的密钥,再由AES加密明文内容,AES加密强度大,速度快,但是密钥更新繁琐和不安全,由强度很大的非对称密钥算法对AES密钥加密,结合了两方的优点(this programme combine the ECC with AES.using the ECC to cipher the AES key,and using the AES to cipher the m)
    2020-06-29 10:20:02下载
    积分:1
  • DES
    以DES加密算法为例理解对称密码算法,用计算机模拟DES加密解密算法。 (DES encryption algorithm as an example to understand the symmetric cipher algorithm, using computer simulation DES encryption and decryption algorithms.)
    2013-06-16 15:43:14下载
    积分:1
  • ElGamalPSignature
    vc++写的ElGamal加密系统,能够对简单的数字进行加密。(The ElGamal encryption systems, vc++ write simple digital encryption.)
    2013-04-04 20:29:48下载
    积分:1
  • h2
    将天骄2服务端的加密文本文件与生成的软件放在同一目录下,点击批量转换, 完成后会在同目录下生成一个名为temp的文件夹,其中存放的就是转换后的文件. 因为加密和解密的规则完全相同,所以加密过程和解密过程相同, 也就是说如果原来的文件存放的是原文,转换后就会生成密文,如果原来是密文,转换后生成原文. 适用于天骄2,凤舞天骄的所有版本服务端.(The the Tianjiao 2 server encrypted text file in the same directory with the generated software, click on the batch conversion finished, it will generate a folder named temp in the same directory, which store the converted file encryption and decryption rules are identical, so the encryption and decryption process is the same, that is to say if the original file is stored in the original conversion will generate the ciphertext, if the original ciphertext, conversion generated text. apply to tianjiao, all of Fung Mo tianjiao, the version of the server.)
    2013-04-27 11:47:04下载
    积分:1
  • cryptLib
    100 多个加密和解密可以用到的库, 本人悉心收藏的精品(100 can be used to encrypt and decrypt the library, my collection of boutique carefully)
    2010-08-15 17:35:42下载
    积分:1
  • AML-Efficient-Approximate-Membership
    AML EFFICIENT APPROXIMATE MEMBERSHIP LOCALIZATION WITHIN A WEB-BASED JOIN FRAMEWORK ABSTRACT: In this paper, we propose a new type of Dictionary-based Entity Recognition Problem, named Approximate Membership Localization (AML). The popular Approximate Membership Extraction (AME) provides a full coverage to the true matched substrings from a given document, but many redundancies cause a low efficiency of the AME process and deteriorate the performance of real-world applications using the extracted substrings. The AML problem targets at locating non overlapped substrings which is a better approximation to the true matched substrings without generating overlapped redundancies. In order to perform AML efficiently, we propose the optimized algorithm P-Prune that prunes a large part of overlapped redundant matched substrings before generating them.
    2013-12-15 16:45:53下载
    积分:1
  • 696516资源总数
  • 106442会员总数
  • 11今日下载