-
SUPER LOSHINAYA PROGA!!!!!!!!11
SUPER LOSHINAYA PROGA-SUPER LOSHINAYA PROGA!!!!!!!!11
- 2022-05-20 19:21:38下载
- 积分:1
-
这是三重算法源代码(C++语言版本)
这个是三重DES算法源代码(C语言版本) -This is the Triple DES algorithm source code (C language version)
- 2022-12-11 06:55:03下载
- 积分:1
-
椭圆曲线密码体制的实现。该项目没有开发C++编译器的任何问题…
ECC Implmentation . The programme works without any problem on compiler Dev C++ available at bloodshed.
- 2023-05-12 12:15:04下载
- 积分:1
-
Java Cryptography and source code
Java Cryptography and source code
- 2022-06-20 08:23:42下载
- 积分:1
-
MIME base64 简单的编解码,主要用于学习之用
MIME base64 简单的编解码,主要用于学习之用-A simple MIME base64 encoding and decoding.
- 2022-05-13 22:33:06下载
- 积分:1
-
a sample algorithm of rsa in langage C
a sample algorithm of rsa in langage C-a sample algorithm of rsa in langage C++
- 2023-02-04 03:10:04下载
- 积分:1
-
IDEA加密算法属于数据块加密算法(Block Cipher)类。IDEA使用长度为128bit的密钥,数据块大小为64bit。...
IDEA加密算法属于数据块加密算法(Block Cipher)类。IDEA使用长度为128bit的密钥,数据块大小为64bit。-IDEA encryption algorithm is data block encryption algorithm (Cipher Block) category. IDEA use of the length of the 128 bit key, the data block size for 64bit.
- 2022-01-25 22:47:24下载
- 积分:1
-
PCSC通讯例程
使用PSCS的API接口操作CPU卡, ISO7816 T=0 协议,标准PCSC函数,CPU卡指令测试。使用PSCS的API接口操作CPU卡, ISO7816 T=0 协议,标准PCSC函数,CPU卡指令测试。使用PSCS的API接口操作CPU卡, ISO7816 T=0 协议,标准PCSC函数,CPU卡指令测试。
- 2022-07-02 17:43:32下载
- 积分:1
-
使用crypt api创建一个会话密钥。 在这个例子中使用了一个168位的3DES key
使用crypt api创建一个会话密钥。 在这个例子中使用了一个168位的3DES key-use crypt api to create a session key. In this example the use of a 168 DES key 3
- 2022-02-24 16:06:26下载
- 积分:1
-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1