-
是啊 10 点
包含的.m 文件那土窖使用 RSA Algorihtme 所以享受它只笑着现在这由创建的 hahahahahhahahahhah"肖恩 · 戈麦斯"大家伙从我不知道请结束 100 字符:)
- 2023-01-25 11:35:04下载
- 积分:1
-
字符串加密
字符串加密 -String encrypted string encryption
- 2022-03-23 03:00:47下载
- 积分:1
-
1. This program will all possible symbols in English and in the definition of th...
1.本程序将所有可能出现的英文和符号定义在ASCII表中的“000--255”中的256个常用字符
2.在实现2的基础上,实现控制台对英文文本文件(注意明文和密文都以文件形式存在)的加解密
形式:cipher 源文件名 目的文件名 密钥 E/D(标示加解密)说明:对于加密来说,源文件名就是明文,对于解密来说,源文件名就是密文-1. This program will all possible symbols in English and in the definition of the ASCII table, "000-- 2 55 "of 256 commonly used characters in two. in achieving two on the basis of Console achieve the English text files (and expressly close attention to the text of a document form) encryption forms : cipher source document file names Key E/D (marked increase declassified) Note : For encryption, source file name is expressly for declassification, the source file name is ciphertext
- 2022-05-25 21:59:44下载
- 积分:1
-
do encryption components from other places to download overnight.
一个C#做的加密组件,从别的地方下载过来的。-do encryption components from other places to download overnight.
- 2022-09-29 04:45:03下载
- 积分:1
-
crc算法的源码,项目中实现的crc算法,用于校验
crc算法的源码,项目中实现的crc算法,用于校验-crc algorithm source code, project implementation crc algorithm for checking
- 2023-02-08 21:35:03下载
- 积分:1
-
Windows easy to use free MD5 verification tools WMD5
Windows易用免费MD5验证工具WMD5
- 2022-04-08 06:34:26下载
- 积分:1
-
DES Crypt adapted from unix crypt for delphi.
DES Crypt adapted from unix crypt for delphi.
- 2022-07-04 21:52:57下载
- 积分:1
-
md5算法,采用c++实现的md5_16位实现
md5算法,采用c++实现的md5_16位实现-md5 algorithm, used to achieve the c-achieving md5_16
- 2023-07-14 14:45:03下载
- 积分:1
-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1
-
简单演示了下如何利用DELPHI制作加壳器
简单演示了下如何利用DELPHI制作加壳器-Simple demonstration of how to use the next production加壳browser DELPHI
- 2022-02-26 05:40:19下载
- 积分:1