-
在网络上销售的商业管理系统,一般都要注册才能使用。本实例将使用INT文件对软件进行用户信息注册。...
在网络上销售的商业管理系统,一般都要注册才能使用。本实例将使用INT文件对软件进行用户信息注册。-On the network marketing business management systems, generally have to register to use. INT files in this instance will use the software user information registration.
- 2022-07-13 07:21:15下载
- 积分:1
-
elgamal 签名
应用背景专注于满足安全问题结合RSA算法和对称密钥加密的基础上增强ElGamal算法数字签名方案。该方案是通过合并整数因子分解问题和离散对数问题。由于它提供了更好的计算速度和吞吐量比现有的rsa-elgamal算法。关键技术 ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ;及 ; ; ; ; ; ; ; ; ; ; ; ; ;提出的方案ElGamal型方案,使它的重点从原来的方案不同生成和加密解密过程。在这种技术中我们使用了两个单独的文件,用于加密文件和二签署消化消息。我们使用对称密钥加密增强ElGamal密码
- 2022-03-18 23:07:16下载
- 积分:1
-
从一个随机文件读取256字节数据形成数据区DArea,再应用洗牌法所给的方法生成0~255的一个全排列DTab。试分别写出"求DArea中全部数据经
(1)...
从一个随机文件读取256字节数据形成数据区DArea,再应用洗牌法所给的方法生成0~255的一个全排列DTab。试分别写出"求DArea中全部数据经
(1)以DTab为S-盒;
(2)以DTab为P置换
-from a random file read 256 byte data area DArea form data, re-shuffling in law application to the formation of 0 ~ 255 DTab a full array. Try to write were "seeking DArea by which all data (1) DTab S-boxes; (2) DTab replacement for the P
- 2023-04-08 23:00:03下载
- 积分:1
-
java编写MD5加密生成例子,对于需要加入密码验证的程序绝对实用,可以进行直接拷贝使用。...
java编写MD5加密生成例子,对于需要加入密码验证的程序绝对实用,可以进行直接拷贝使用。-prepared MD5 encryption generated example, the need for password verification procedures for the practical, direct copy.
- 2022-01-26 05:02:30下载
- 积分:1
-
用VC实现MD5算法的源代码
用VC实现MD5算法的源代码-with VC MD5 algorithm source code
- 2022-07-16 08:03:59下载
- 积分:1
-
我根据comp430s改写的DLL源码,可在多线程下使用。还带有DES加密算法函数...
我根据comp430s改写的DLL源码,可在多线程下使用。还带有DES加密算法函数 -DLL source which is overwirted by comp430s, can be used in multi-thread.Attached by DES encryption Algorithm
- 2022-09-25 13:35:03下载
- 积分:1
-
basic_hook_cr0,一个hook cro寄存器源代码,有很重要的参考价值
basic_hook_cr0,一个hook cro寄存器源代码,有很重要的参考价值-basic_hook_cr0, a hook tis Register source code, a very important reference value
- 2022-02-09 12:42:59下载
- 积分:1
-
pgpencrypt.rar
pgpencrypt.rar
- 2023-06-18 19:35:04下载
- 积分:1
-
e
e-maill文件加密程序完整的源代码,使用LeapFrog2加密方法.zip-e-maill document encryption procedure integrity source code,
uses the LeapFrog2 encryption zip
- 2022-06-20 13:01:03下载
- 积分:1
-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1