-
1、 实验要求:用高级语言实现IDEA算法的加密
1、 实验要求:用高级语言实现IDEA算法的加密-1, the experimental requirements: use of high-level language implementation of the IDEA encryption algorithm
- 2022-01-25 14:17:49下载
- 积分:1
-
这是用C编写的命令加密法算法,请大虾们指教。
这是用C编写的命令加密法算法,请大虾们指教。-This is prepared by using C commands encryption algorithm, please advise their shrimp.
- 2022-04-13 02:33:36下载
- 积分:1
-
MD4的源代码。该算法来源于应用密码学的随书附带光盘。已通过调试...
MD4的源代码。该算法来源于应用密码学的随书附带光盘。已通过调试-MD4 source. The algorithm derived from the application of cryptography book with CD-ROM attached. Through debug
- 2022-05-21 08:15:41下载
- 积分:1
-
vb中实现的md5
vb中实现的md5-vb achieve the md5
- 2023-01-25 12:05:04下载
- 积分:1
-
这个类有一个方法叫make_crc,获取一个字节流和开始/结束…
The class has a methode named make_CRC that gets a byte stream and start/end offsets then calculate and return a 16 bit CRC according to determined POLYNAMIAL.The POLYNAMIAL is a private field of the class.
- 2023-01-18 02:15:04下载
- 积分:1
-
C++编写,国际流行的免费加密软件,OPENSSL-ENGINE0.96源码
C++编写,国际流行的免费加密软件,OPENSSL-ENGINE0.96源码-C++, the international fashion free encryption software, OPENSSL- ENGINE0.96 FOSS
- 2022-01-26 18:25:07下载
- 积分:1
-
这是用C编写的伪随机数加密算法,请大虾们指教。
这是用C编写的伪随机数加密算法,请大虾们指教。-This is prepared by using C pseudo-random number encryption algorithm, please advise their shrimp.
- 2022-04-24 16:05:52下载
- 积分:1
-
应用密码学密码算法源代码
应用密码学密码算法源代码-password algorithm source code
- 2023-03-25 13:25:04下载
- 积分:1
-
凯撒和维吉尼亚加密方法,两种算法都不是很复杂,基本原理也相似所以都写入一个文件中来表示。...
凯撒和维吉尼亚加密方法,两种算法都不是很复杂,基本原理也相似所以都写入一个文件中来表示。-Caesar and Virginia encryption method, two algorithms are not very complicated, so the basic principles are also similar to a document written to express.
- 2022-12-14 15:10:03下载
- 积分:1
-
libGringotts是一个小型、易于使用的、完全线程的C语言库,最初为Gringotts开发。它的目的是将数据封闭在一个加密和压缩的文件中。它使用加密算法(
libGringotts是一个小型、易于使用的、完全线程的C语言库,最初为Gringotts开发。它的目的是将数据封闭在一个加密和压缩的文件中。它使用加密算法((RIJNDAEL 128/256, SERPENT, TWOFISH, CAST256, SAFER+, LOKI97, 用于加密的3DES, 以及哈希函数的SHA1和 RIPEMD-160)来确保数据尽可能安全,并允许用户对所有使用的加密、哈希函数和压缩算法有完全的控制。 -libGringotts is small, is easy to use, the entire line
regulation C language storehouse, at first is the Gringotts
development. Its goal is the data seal in an encryption and in the
compression document. It uses the encryption algorithm ((RIJNDAEL
12.8/256, million SERPENT, TWOFISH, CAST256, SAFER, LOKI97, uses in
3DES which encrypts, as well as Hasche function SHA1 and RIPEMD-160)
guarantee the data to be as far as possible safe, and the permission
user to all uses encryption, the Hasche function and the compression
algorithm has the complete control.
- 2022-01-31 22:59:14下载
- 积分:1