-
一些常用编码,加密算法的c/c++代码,包括,base64,sha1,des,md5等...
一些常用编码,加密算法的c/c++代码,包括,base64,sha1,des,md5等-Some commonly used encoding, encryption algorithm c/c++ Code, including, base64, sha1, des, md5, etc.
- 2022-02-07 00:24:25下载
- 积分:1
-
RSA
RSA-1.02VERSION
- 2023-09-05 10:05:03下载
- 积分:1
-
沙
SHA-1Hash函数源码,可以对任何文件做Hash,得到的Hash值为160位。具有抗强碰撞,弱碰撞等能力。虽然王小云已经找到了个别碰撞。但在新的好的hash函数出来之前仍将被广泛使用。-SHA-1Hash function source, any document can be done right hash, the hash value of 160. Anti-collision, the weak capabilities of the collision. Although Bruce Schneier, had found individual collisions. But the new good hash function will be out before widespread use.
- 2023-06-21 07:50:03下载
- 积分:1
-
MD5 algorithm. MD5 to 512 groups to deal with the importation of information and...
MD5算法的实现。MD5以512位分组来处理输入的信息,且每一分组又被划分为16个32位子分组,经过了一系列的处理后,算法的输出由四个32位分组组成,将这四个32位分组级联后将生成一个128位散列值。
-MD5 algorithm. MD5 to 512 groups to deal with the importation of information and each group was also divided into 16 groups of 32 seats, After a series of processing, the output from the algorithm 4 32 subgroups, 4 32 this group will generate a cascade 128 hash value.
- 2022-03-22 20:21:27下载
- 积分:1
-
alternative Password Login Window (puzzles), the only correct map decorated resu...
另类密码登录窗体(拼图),只有正确拼出结果图才能进入。-alternative Password Login Window (puzzles), the only correct map decorated results can be admitted.
- 2022-02-06 08:14:21下载
- 积分:1
-
密码学文献有一个奇妙的发展历程,当然,密而不宣总是扮演主要角色。第一次世界大战前,重要的密码学进展很少出现在公开文献中,但该领域却和其它专业学科一样向前发展。...
密码学文献有一个奇妙的发展历程,当然,密而不宣总是扮演主要角色。第一次世界大战前,重要的密码学进展很少出现在公开文献中,但该领域却和其它专业学科一样向前发展。-cryptography literature has a wonderful history, of course, close does not declare always played the leading role. Before the First World War, it was important to cryptography little progress emerged in the open literature. However, the area has other professional disciplines and the development of the same.
- 2022-03-30 19:34:10下载
- 积分:1
-
是我设计的在DSB中隐藏语音的例子.
用ELANIX公司的SYSTEMVIEW打开运行.
其掩护信号和隐藏信号输入输出端均需设置语音源文件,比如自己录制...
是我设计的在DSB中隐藏语音的例子.
用ELANIX公司的SYSTEMVIEW打开运行.
其掩护信号和隐藏信号输入输出端均需设置语音源文件,比如自己录制的声音.-I designed the DSB concealed voice example. ELANIX company with the SYSTEMVI EW open operation. their cover and concealment signal input and output signals required to set up voice source, For example, recording their voices.
- 2022-07-24 12:24:23下载
- 积分:1
-
极好的加密程序,DES的接班人,源码是DEHLPHI的Pascal,编译后可直接运行...
极好的加密程序,DES的接班人,源码是DEHLPHI的Pascal,编译后可直接运行-Excellent encryption, DES s successor, is DEHLPHI source of Pascal, the compiler can be run directly
- 2023-07-04 04:20:02下载
- 积分:1
-
The use of OpenSSL to achieve file encryption
运用 OpenSSL 实现对文件加密-The use of OpenSSL to achieve file encryption
- 2022-12-16 21:45:03下载
- 积分:1
-
enigma3模拟二战的加密算法
ENIGMA3模拟WW II加密算法-ENIGMA3 simulation WW II encryption algorithm
- 2022-02-13 05:10:05下载
- 积分:1