登录
首页 » 加密解密 » tablecrypt是一个文件加密工具。

tablecrypt是一个文件加密工具。

于 2022-06-18 发布 文件大小:44.21 kB
0 203
下载积分: 2 下载次数: 1

代码说明:

TableCrypt is a file encryption utility. The major difference with most file encryptors is that this program uses a generated table in combination with a password to encrypt a file. This way you need 2 variables to decrypt the file. This is how it works: Generate a 10kb table file and enter a password. The password is used to pick bytes from the table file which in their turn are used to encrypt the bytes of the inputfile with XOR encryption.

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 这是一个古典算法。是最近自己编写的。
    这是一个古典加密算法。是最近自己编写的。-This is a classical encryption algorithm. Recently prepared themselves.
    2023-04-14 22:10:03下载
    积分:1
  • 码学文献有一个奇妙的发展历程,当然,而不宣总是扮演主要角色。第一次世界大战前,重要的码学进展很少出现在公开文献中,但该领域却和其它专业学科一样向前发展。...
    密码学文献有一个奇妙的发展历程,当然,密而不宣总是扮演主要角色。第一次世界大战前,重要的密码学进展很少出现在公开文献中,但该领域却和其它专业学科一样向前发展。-cryptography literature has a wonderful history, of course, close does not declare always played the leading role. Before the First World War, it was important to cryptography little progress emerged in the open literature. However, the area has other professional disciplines and the development of the same.
    2022-03-30 19:34:10下载
    积分:1
  • IBE identity
    IBE基于身份的加密系统的身份提取程序,使用VC6.0开发,即把身份转换成椭圆曲线上的点-IBE identity-based encryption system of the identity of extraction procedures, using VC6.0 development, namely, the identity into a point on the elliptic curve
    2023-02-17 10:35:04下载
    积分:1
  • Third
    第三代移动系统中以Kasumi为内核的另一加密算法-f8算法的VC++实现-Third-generation mobile system to Kasumi for kernel-f8 encryption algorithm to another algorithm VC++ Realize
    2022-01-27 20:14:13下载
    积分:1
  • API的使用例子,你可以从例子中学习
    Crypto api 使用实例,可以学习的例子-Crypto api to use examples, you can learn from examples
    2022-06-16 00:50:42下载
    积分:1
  • It s about algorithm for caesar encode
    It s about algorithm for caesar encode
    2022-03-10 12:41:41下载
    积分:1
  • On Java encryption technology and the integration of Windows
    论Java加密技术与Windows的结合-On Java encryption technology and the integration of Windows
    2022-01-26 14:17:56下载
    积分:1
  • aadddddddddddddddddd
    DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDdddddddddddddddddddddddddddddddddddddddddddddd
    2022-07-21 16:50:27下载
    积分:1
  • 、安全、压缩处理,实例,有爱好者可以学习
    加密、安全、压缩处理,实例,有爱好者可以学习-Encryption, security, compression treatment, examples have lovers can learn
    2022-03-20 04:05:48下载
    积分:1
  • ieee一种基于混沌的新方法An Image Encryption Scheme Based on Chaotic Map...
    ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security
    2022-05-30 11:41:05下载
    积分:1
  • 696518资源总数
  • 106164会员总数
  • 18今日下载