-
银行数据安全的加密技术和设备
银行数据安全的加密技术和设备-bank data security encryption technology and equipment
- 2022-11-30 19:20:03下载
- 积分:1
-
一个利用C语言来实现加密算法之DES算法的源码。
一个利用C语言来实现加密算法之DES算法的源码。-A source program of DES arithmetic using C .
- 2022-09-07 03:55:03下载
- 积分:1
-
信息隐藏软件JSteg在VC环境下的源代码
原本为Linux下的版本,现已修改至可在VS2008下编译。共有两个工程,CJpeg(隐藏)和DJpeg(提取)。E:JStegcjpeg 的目录2014/04/09 16:13 .2014/04/09 16:13 ..2014/03/19 12:39 3,905 bitsourc.c1997/06/01 20:44 131 bitsourc.h2014/04/02 11:03 863,232 cjpeg.ncb2014/03/12 12:39 875 cjpeg.sln2014/03/19 11:47 5,503 cjpeg.vcproj1992/08/07 19:02 &nb
- 2022-04-24 10:41:25下载
- 积分:1
-
提供服务端登陆验证程序(验证码随机改变,防止非法进入);
提供服务器控制程序,管理员可以允许、屏蔽和删除一个注册用户的登陆客户端;
任何改变访问地点...
提供服务端登陆验证程序(验证码随机改变,防止非法进入);
提供服务器控制程序,管理员可以允许、屏蔽和删除一个注册用户的登陆客户端;
任何改变访问地点的行为,都必须得到管理员的授权,否则无法登陆系统;
即使知道其他用户的密码也不能登陆系统。-provide certification services-landing procedures (Random Verification code change to prevent illegal entry); Provide server control procedures, administrators can allow, shielding and delete a user"s landing client; Any change in location of the visit have to be authorized administrators, whether while not landing systems; even if they know the password for other users can not landing system.
- 2022-02-06 22:11:41下载
- 积分:1
-
including key disk production software, LIB, DLL encryption modules in various l...
包括密钥盘制作软件、LIB、DLL 加密模块 各种语言调用加密模块的例子程序、网络注册软件等-including key disk production software, LIB, DLL encryption modules in various languages called encryption module example, Web registration software
- 2022-04-12 13:10:22下载
- 积分:1
-
一个非常好用而且实用的非对称加密算法,里面有实例,完整的源码。...
一个非常好用而且实用的非对称加密算法,里面有实例,完整的源码。-a very handy and practical non-symmetric encryption algorithm, there are examples, complete source code.
- 2022-05-22 09:11:37下载
- 积分:1
-
3des 的c语言版
用于android jni的c语言版 3des算法
- 2022-03-02 05:11:16下载
- 积分:1
-
RSA的加密算法的应用DEMO 也是用来加密的。
RSA的加密算法的应用DEMO 也是用来加密的。-RSA encryption algorithm application DEMO also is uses for to
encrypt.
- 2022-08-05 16:59:23下载
- 积分:1
-
128192和256位密钥的密码Twofish的VHDL实现。
VHDL implementation of the twofish cipher for 128,192 and 256 bit keys.
The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.-VHDL implementation of the twofish cipher for 128,192 and 256 bit keys.
The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some
- 2022-07-08 23:33:44下载
- 积分:1
-
hash算法的vb实现.很好用!
hash算法的vb实现.很好用!-hash algorithm to achieve the vb. With good!
- 2022-03-21 07:41:04下载
- 积分:1