登录
首页 » 加密解密 » 古典加密算法,非常实用,有需要的可以下载,不需权限

古典加密算法,非常实用,有需要的可以下载,不需权限

于 2022-05-15 发布 文件大小:3.77 kB
0 165
下载积分: 2 下载次数: 1

代码说明:

古典加密算法,非常实用,有需要的可以下载,不需权限-this code is very good

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • Delphi写的base64算法程序
    Delphi写的base64算法程序--Base64 algorithm program writed by Delphi
    2022-03-04 22:03:17下载
    积分:1
  • DEC算法的实现,很特别
    DEC算法的实现,很特别-DEC algorithm to achieve something special
    2022-02-14 05:32:09下载
    积分:1
  • 代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
    2023-06-18 10:00:03下载
    积分:1
  • SHA-1Hash函数源码,可以对任何文件做Hash,得到的Hash值为160位。具有抗强碰撞,弱碰撞等能力。虽然王小云已经找到了个别碰撞。但在新的好的hash函数出来之前仍将被广泛使用。-SHA-1Hash function source, any document can be done right hash, the hash value of 160. Anti-collision, the weak capabilities of the collision. Although Bruce Schneier, had found individual collisions. But the new good hash function will be out before widespread use.
    2023-06-21 07:50:03下载
    积分:1
  • enigma3模拟二战的算法
    ENIGMA3模拟WW II加密算法-ENIGMA3 simulation WW II encryption algorithm
    2022-02-13 05:10:05下载
    积分:1
  • 用VC编辑的一个MD5算法,很好用可以顺利进行运行
    用VC编辑的一个MD5算法,很好用可以顺利进行运行-VC editor of an MD5 algorithm is useful for the smooth running
    2022-02-01 21:32:41下载
    积分:1
  • VHDL把图片移动到星号码上码的原形就看到啦.zip]
    VHDL把图片移动到星号密码上密码的原形就看到啦.zip] - 程序里有一个张图片.把图片移动到星号密码上,密码的原形就看到啦 [QQ 2005贺岁版登录口令加密算法及其源代码.rar] - QQ 2005贺岁版登录口令加密算法及其源代码,请大家指教 [各cracked软件的安装方法.rar] - 各种开发用常用软件的破解安装方法 非常值得收藏的好东西-VHDL Pictures moved to the asterisk password on the password will see it when prototype. Zip]- is a procedure Lane photo. Pictures moved to the asterisk password, Password prototype will see it when [QQ 2005 Hesuiban login password encryption algorithm and its source code. rar]- QQ 2005 Hesuiban login password encryption algorithm and its source code, Please enlighten [the cracked software installation method. rar]- all commonly used in the development of software security crack installation method is very worthwhile collection of good things
    2022-04-21 19:45:54下载
    积分:1
  • 本文介绍了在JAVA环境下如何实现IDEA对称算法。由于电子商务和电子政务的普及,安全技术在其中应用非常广泛,对安全技术的要求也很高。目前在JAVA...
    本文介绍了在JAVA环境下如何实现IDEA对称加密算法。由于电子商务和电子政务的普及,安全加密技术在其中应用非常广泛,对安全加密技术的要求也很高。目前在JAVA环境下实现IDEA加密具有很多的优势,因为JAVA是基于面向对象的编程语言,并且由于它的平台无关性能被大量应用于Internet的开发。-This paper presents the Java environment IDEA how to achieve symmetric encryption algorithm. As e-commerce and e-government popular, security encryption technology, which is widely used for security encryption technology requirements is also high. In Java environment under IDEA encryption has many advantages, because Java is based on object-oriented programming language, and because it is platform independent performance was widely used in Internet development.
    2022-05-08 18:12:15下载
    积分:1
  • 字符串模糊查询 字符串模糊查询
    字符串模糊查询 字符串模糊查询-Fuzzy query string string Fuzzy Query
    2022-10-03 10:55:03下载
    积分:1
  • sha码检验的示例 希望对大家有 帮助
    sha密码检验的示例 希望对大家有 帮助-sha password test examples we hope to help
    2023-07-25 10:45:03下载
    积分:1
  • 696518资源总数
  • 106227会员总数
  • 11今日下载