登录
首页 » 加密解密 » 存UTF8格式文件

存UTF8格式文件

于 2022-02-21 发布 文件大小:2.41 kB
0 156
下载积分: 2 下载次数: 1

代码说明:

存UTF8格式文件-deposit UTF8 format

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 2的16次幂正整数d与n,编写计算d
    2的16次幂正整数d与n,编写计算d-1 (mod n) 的程序; 2、对于三个不超过2的16次幂正整数a、e与n,编写计算ae (mod n) 的程序。 在上述程序基础上写出下列程序: (1) 对给定的10000以内数判定其是否为素数; (2) 进行ElGamal体制的加密与签名。 -two of 16 power-positive integer d and n, calculate the preparation of d-1 (mod n); 2. For not more than 2 3 16 Powers positive integers a, e and n, calculate the preparation ae (mod n) procedures. In the above procedure to write on the basis of the following procedures : (a) the right to 10,000 within a few judging whether a prime number; (2) ElGamal encryption and signature.
    2022-02-14 21:21:03下载
    积分:1
  • 一个伪随机数生成程序,简单实用,有需要的请下载
    一个伪随机数生成程序,简单实用,有需要的请下载-A pseudo-random number generator, if necessary, please download the
    2022-01-31 23:45:21下载
    积分:1
  • c++的MD5类,简单好用,只需要包含进去,就能方便使用
    c++的MD5类,简单好用,只需要包含进去,就能方便使用-c++ the MD5 class, easy-to-use, only need to include, we can facilitate the use of
    2023-01-04 03:35:04下载
    积分:1
  • delphi编写的壳程序,实现对文件保护
    delphi编写的加壳程序,实现对文件保护-delphi write the packers program to realize File Protection
    2022-08-23 18:21:54下载
    积分:1
  • ieee一种基于混沌的新方法An Image Encryption Scheme Based on Chaotic Map...
    ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security
    2022-05-30 11:41:05下载
    积分:1
  • 3DES算法~~~~~~~ 码学课程设计
    3DES加密算法~~~~~~~ 密码学课程设计-3DES encryption algorithm ~~~~~~~ Cryptography Course Design
    2022-08-11 01:52:05下载
    积分:1
  • x264编码一个可执行程序的x264.exe,因为我只修改X264算法…
    一个x264编码的可执行程序 x264.exe,因为我只修改了 x264 的算法,未加入任何汇编,也没有修改x264的接口和功能,所以原版 x264 能运行的平台,此程序也应当能运行,且功能及调用方式不变。 执行命令方式为: -o 输出文件 输入文件 宽x高 -B 目标码率-X264 encoding an executable program x264.exe, because I only modified x264 algorithms, not to join any compilation, there is no modification of the interface and functionality of x264, the x264 can run the original platform, this procedure should also be able to run, and function and calls the same way. For the implementation of the order:-o output file input file width x high-B target rate
    2022-05-21 01:18:22下载
    积分:1
  • using Twofish 128 blocks of data (128 bits lock) EliteConnect (TM) Universal
    Twofish 采用128位数据块(128 bits lock),128-192-256-bit 可变长度密钥。-using Twofish 128 blocks of data (128 bits lock) EliteConnect (TM) Universal-192-256-bit variable-length keys.
    2022-08-06 06:33:30下载
    积分:1
  • 这个是基于混沌的AES算法
    这个是基于混沌的AES加密算法-Chaos AES encryption algorithm
    2022-02-06 03:51:44下载
    积分:1
  • Playfair源代码是很简单的,随着网络的现有的版本是不同的…
    playfair的源代码,很简洁,跟网上现存的版本有所差异,但是效果是很不错的。-playfair source code is very simple, with the existing version of the web is different, but the effect is very good.
    2022-10-22 16:05:03下载
    积分:1
  • 696518资源总数
  • 106215会员总数
  • 5今日下载