-
AES加密源代码实例
AES加密源程序示例-AES encryption source code examples
- 2022-01-26 00:29:39下载
- 积分:1
-
JAVA开发的,使用RSA,MD5开发的简单数字签名软件,可以用来对文件和消息做数字签名。...
JAVA开发的,使用RSA,MD5开发的简单数字签名软件,可以用来对文件和消息做数字签名。 -JAVA development, the use of RSA, MD5 developed a simple digital signature software, can be used for documents and information to do a digital signature.
- 2023-03-16 05:15:03下载
- 积分:1
-
MD5加密算法源代码+DLL成品,这个更好,有完整的VC源码,更加强大,可以直接做成DLL文件进行调用.特爽,MD5就不用说了吧....
MD5加密算法源代码+DLL成品,这个更好,有完整的VC源码,更加强大,可以直接做成DLL文件进行调用.特爽,MD5就不用说了吧.-MD5 encryption algorithm source code DLL finished, the better, a complete source VC, more powerful, and can directly cause for calling DLL files. Special autumn, MD5 would not have said it.
- 2022-07-22 11:23:34下载
- 积分:1
-
BlowFish加密算法.封装过程按照标准的API形式进行
BlowFish加密算法.封装过程按照标准的API形式进行-BlowFish encryption algorithm. Packaging process in accordance with the standard form of the API
- 2022-04-24 04:19:33下载
- 积分:1
-
c语言文件加密程序
c语言文件加密程序-file encryption procedures
- 2022-01-26 04:02:13下载
- 积分:1
-
RC4加密算法源代码
RC4加密算法源码-RC4 encryption algorithm source code
- 2022-02-24 19:18:09下载
- 积分:1
-
一个SHA加密库文件,用汇编语言开发完成的
一个SHA加密库文件,用汇编语言开发完成的-a SHA encryption for document assembly language development completed
- 2022-01-24 17:18:35下载
- 积分:1
-
说明:des算法的实现代码 */
能够实现56位或56*n密钥的des算法,可以通过该程序提供的接
进行数据的加密,保证数据在传送...
说明:des算法的实现代码 */
能够实现56位或56*n密钥的des算法,可以通过该程序提供的接
进行数据的加密,保证数据在传送过程的安全性-Description: des algorithm realize the code*/can be achieved 56 or 56* n keys des algorithm, can be provided through the program access data encryption to ensure data security during transmission of
- 2023-07-08 13:10:03下载
- 积分:1
-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1
-
rsa encryption which ask a user input must me be uppercase letter
rsa encryption which ask a user input must me be uppercase letter-rsa encryption which ask a user input must me be uppercase letter..
- 2022-01-25 22:54:08下载
- 积分:1