-
Delphi写的base64算法程序
Delphi写的base64算法程序--Base64 algorithm program writed by Delphi
- 2022-03-04 22:03:17下载
- 积分:1
-
DEC算法的实现,很特别
DEC算法的实现,很特别-DEC algorithm to achieve something special
- 2022-02-14 05:32:09下载
- 积分:1
-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1
-
沙
SHA-1Hash函数源码,可以对任何文件做Hash,得到的Hash值为160位。具有抗强碰撞,弱碰撞等能力。虽然王小云已经找到了个别碰撞。但在新的好的hash函数出来之前仍将被广泛使用。-SHA-1Hash function source, any document can be done right hash, the hash value of 160. Anti-collision, the weak capabilities of the collision. Although Bruce Schneier, had found individual collisions. But the new good hash function will be out before widespread use.
- 2023-06-21 07:50:03下载
- 积分:1
-
enigma3模拟二战的加密算法
ENIGMA3模拟WW II加密算法-ENIGMA3 simulation WW II encryption algorithm
- 2022-02-13 05:10:05下载
- 积分:1
-
用VC编辑的一个MD5算法,很好用可以顺利进行运行
用VC编辑的一个MD5算法,很好用可以顺利进行运行-VC editor of an MD5 algorithm is useful for the smooth running
- 2022-02-01 21:32:41下载
- 积分:1
-
VHDL把图片移动到星号密码上密码的原形就看到啦.zip]
VHDL把图片移动到星号密码上密码的原形就看到啦.zip] - 程序里有一个张图片.把图片移动到星号密码上,密码的原形就看到啦
[QQ 2005贺岁版登录口令加密算法及其源代码.rar] - QQ 2005贺岁版登录口令加密算法及其源代码,请大家指教
[各cracked软件的安装方法.rar] - 各种开发用常用软件的破解安装方法 非常值得收藏的好东西-VHDL Pictures moved to the asterisk password on the password will see it when prototype. Zip]- is a procedure Lane photo. Pictures moved to the asterisk password, Password prototype will see it when [QQ 2005 Hesuiban login password encryption algorithm and its source code. rar]- QQ 2005 Hesuiban login password encryption algorithm and its source code, Please enlighten [the cracked software installation method. rar]- all commonly used in the development of software security crack installation method is very worthwhile collection of good things
- 2022-04-21 19:45:54下载
- 积分:1
-
本文介绍了在JAVA环境下如何实现IDEA对称加密算法。由于电子商务和电子政务的普及,安全加密技术在其中应用非常广泛,对安全加密技术的要求也很高。目前在JAVA...
本文介绍了在JAVA环境下如何实现IDEA对称加密算法。由于电子商务和电子政务的普及,安全加密技术在其中应用非常广泛,对安全加密技术的要求也很高。目前在JAVA环境下实现IDEA加密具有很多的优势,因为JAVA是基于面向对象的编程语言,并且由于它的平台无关性能被大量应用于Internet的开发。-This paper presents the Java environment IDEA how to achieve symmetric encryption algorithm. As e-commerce and e-government popular, security encryption technology, which is widely used for security encryption technology requirements is also high. In Java environment under IDEA encryption has many advantages, because Java is based on object-oriented programming language, and because it is platform independent performance was widely used in Internet development.
- 2022-05-08 18:12:15下载
- 积分:1
-
字符串模糊查询
字符串模糊查询
字符串模糊查询
字符串模糊查询-Fuzzy query string string Fuzzy Query
- 2022-10-03 10:55:03下载
- 积分:1
-
sha密码检验的示例 希望对大家有 帮助
sha密码检验的示例 希望对大家有 帮助-sha password test examples we hope to help
- 2023-07-25 10:45:03下载
- 积分:1