登录
首页 » 加密解密 » md5例程 主要可以通过程序了解md5如何加密,在编程是可以直接借用。...

md5例程 主要可以通过程序了解md5如何加密,在编程是可以直接借用。...

于 2022-07-17 发布 文件大小:4.80 kB
0 176
下载积分: 2 下载次数: 1

代码说明:

md5例程 主要可以通过程序了解md5如何加密,在编程是可以直接借用。-md5 routines mainly through the process to understand how md5 encryption, in the programming can be borrowed directly.

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 数据技术之几种算法 sa.txt.gz
    数据加密技术之几种算法 sa.txt.gz-data encryption technology several algorithms rsa.txt.gz
    2022-03-24 03:30:44下载
    积分:1
  • 有关椭圆曲线数字签名的书籍,是码学的一个重要分支
    有关椭圆曲线数字签名的书籍,是密码学的一个重要分支-a digital of signature base on ecc
    2022-07-10 19:36:34下载
    积分:1
  • 自毁程序
    鉴于单纯设置一个计数器易被查出,通过修改使其不起作用。我们设计的程序可以通过数据文件,软件执行前通过关键字找到计数基数,然后计算和判别,如果在合理范围,则设定新的关键字,将计数基数放在新关键字指定的位置,并执行子程序 则启动自毁程序。
    2022-12-11 09:25:03下载
    积分:1
  • MPEG 码源码 。。 。。 。。慎重
    MPEG 解码源码 。。 。。 。。慎重-的
    2022-06-01 22:20:01下载
    积分:1
  • windows2000以上自带的api
    windows2000以上自带的加密api-dpapi的使用例子.-windows2000 above onboard encryption api- dpapi examples of the use.
    2022-05-31 08:18:26下载
    积分:1
  • SHa1,经典算法,时代之骄傲
    SHa1,经典加密算法,时代之骄傲-SHa1, classical encryption algorithm, proud of the times
    2023-03-27 17:25:04下载
    积分:1
  • twofish的算法
    twofish的加密算法-twofish encryption algorithm
    2022-08-07 22:08:39下载
    积分:1
  • AES complete source
    AES算法完整源码-AES complete source
    2022-09-20 15:30:04下载
    积分:1
  • ElGamal
    elgamal的源程序-ElGamal
    2023-09-01 04:35:03下载
    积分:1
  • ieee一种基于混沌的新方法An Image Encryption Scheme Based on Chaotic Map...
    ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security
    2022-05-30 11:41:05下载
    积分:1
  • 696516资源总数
  • 106642会员总数
  • 12今日下载