-
用于GSM加密的A5算法实现
用于GSM加密的A5算法实现- Uses in GSM the encryption A5 algorithm to realize
- 2022-02-05 20:05:35下载
- 积分:1
-
著名的l0pht代码!
著名的l0pht代码!-famous l0pht code!
- 2022-03-13 20:18:19下载
- 积分:1
-
DES加密代码,是研究密码加密的基础,希望大家能有所收获
DES加密代码,是研究密码加密的基础,希望大家能有所收获-DES encryption code, password encryption is to examine the basis for hope that we can gain
- 2023-08-27 10:45:03下载
- 积分:1
-
使用生成RSA密钥对就
use bouncycastle to generate RSA keyPair
- 2022-04-12 23:27:02下载
- 积分:1
-
列出系统中所有的证书存储区和物理位置 代码参考msdn
列出系统中所有的证书存储区和物理位置 代码参考msdn-listed all the system certificate and the physical storage location code reference VARIANT
- 2022-09-10 03:40:03下载
- 积分:1
-
带密钥的md5算法库md5lib.h共有下列函数:
char* MDString (char *)
/*输入任意一个字符串,经过md5算法处理后...
带密钥的md5算法库md5lib.h共有下列函数:
char* MDString (char *)
/*输入任意一个字符串,经过md5算法处理后,返回结果:一个定长(32个字符)
字符串 */
char* MDFile (char *)
/*输入任意一个文件名,文件内容经过md5算法处理后,返回结果:一个定长
(32个字符)字符串 */
char* hmac_md5(char* text, char* key)
/*输入任意一个字符串text,和一个用做密钥的字符串key,经过hmac_md5算法处
理,返回处理结果:一个定长字符串(32个字符)*/
具体使用方法可参考例子sample.c,其运行结果在本文后面。-Md5 algorithm with a key repository md5lib.h total of the following functions: char* MDString (char*) /* enter any one string, after md5 algorithm processing, return the result: a fixed-length (32 characters) string*/char* MDFile (char*) /* enter any of the file name, file contents through the md5 algorithm processing, return the result: a fixed-length (32 characters) string*/char* hmac_md5 (char* text, char* key) /* input a string of arbitrary text, and a string key used as key, after hmac_md5 algorithm processing, return processing results: a fixed-length string (32 characters)*/specific examples of the use of methods can be found sample.c, the results
- 2022-01-27 23:50:06下载
- 积分:1
-
turecrypt6.0版本的源码,关于这款加密软件毫无疑问是顶尖之作
turecrypt6.0版本的源码,关于这款加密软件毫无疑问是顶尖之作-turecrypt6.0 version of the source, with regard to this there is no doubt that encryption software for the top
- 2022-01-26 14:19:03下载
- 积分:1
-
Internet上的PIK加密算法源程序
Internet上的PIK加密算法源程序-on the Internet PIK encryption algorithm source code
- 2022-12-04 09:35:02下载
- 积分:1
-
一个周期3的多表代替密码,第1个表由密钥字法产生(密钥字自拟),第2个表由洗牌法产生(注意,字母a~z与数字0~25一一对应),第三个表由公式法产生(数学公式自...
一个周期3的多表代替密码,第1个表由密钥字法产生(密钥字自拟),第2个表由洗牌法产生(注意,字母a~z与数字0~25一一对应),第三个表由公式法产生(数学公式自拟,注意它须是Z26上的一个一一变换)-a cycle of three multi-table instead of passwords, a table by key word method, (key word from the intended), Table No. 2 produced by shuffling method (note, a letter with a number of z ~ 0 ~ 25 he gathers), 3rd tables generated by the formula (from the proposed mathematical formula, it should pay attention to the Z26 is a transformation on January 1)
- 2022-01-25 14:05:08下载
- 积分:1
-
IEEE2008年文章An Image Encryption Scheme Based on Chaotic Map
IEEE2008年文章An Image Encryption Scheme Based on Chaotic Map
-An Image Encryption Scheme Based on Chaotic Map
- 2022-06-19 04:19:19下载
- 积分:1