-
用于实现SHA1加密算法,一个标准化的格式,STA…
用java实现的sha1加密算法,格式非常规范,标准的一个程序,注释很详细^_^-used to achieve the sha1 encryption algorithm, a very standardized format, a standard procedure, very detailed notes ^ _ ^
- 2023-02-01 16:25:03下载
- 积分:1
-
程序使用C++展示相当强的XOR加密。
当它unencrypting文件时,包括EOF验错和自动侦查。程序很好被提供并且做在串类建立的好用法。...
程序使用C++展示相当强的XOR加密。
当它unencrypting文件时,包括EOF验错和自动侦查。程序很好被提供并且做在串类建立的好用法。-Program Uses C++ to Demonstrate A Fairly Strong XOR Encryption.
Includes EOF error checking and automatic detection of when it is unencrypting a file.
Program Is Documented Well And Also Makes Good Use of the Built In String Class.
- 2022-12-20 10:10:03下载
- 积分:1
-
使用C编写的DES, DESX, DES3(三层DES) 的加密算法, 本程序演示如何在Delphi中进行调用C编写的算法 DES 密匙长度 8 DESX 密匙...
使用C编写的DES, DESX, DES3(三层DES) 的加密算法, 本程序演示如何在Delphi中进行调用C编写的算法 DES 密匙长度 8 DESX 密匙长度 16 DES3 密匙长度 24 (加密强度高了很多)-C prepared by the use of DES, DESX, DES3 (three-DES) encryption algorithm, the program demonstrates how to call in Delphi in the preparation of the algorithm C key length DES key 8 DESX length 16 DES3 key length 24 (high strength encryption a lot)
- 2022-11-09 19:00:03下载
- 积分:1
-
AES算法的C + +源代码
C++版AES源代码
我在这里献丑了,此加密算法的扩展功能,大家发挥自己的能力写写吧!-C++ AES source
- 2022-02-02 08:31:07下载
- 积分:1
-
自己做的一个数据加密的程序,程序简单,可以直接使用的。...
自己做的一个数据加密的程序,程序简单,可以直接使用的。-Their own to do a data encryption procedures, the procedures simple, can be directly used.
- 2022-04-09 18:08:31下载
- 积分:1
-
wjdesss encryption algorithm
wjdesss加密算法-wjdesss encryption algorithm
- 2022-05-10 23:26:07下载
- 积分:1
-
- 2022-06-27 03:44:25下载
- 积分:1
-
这个是MD5算法C的源代码,希望对大家有用
这个是MD5算法C的源代码,希望对大家有用-This is the MD5 algorithm C source code, in the hope that useful to everybody
- 2023-03-09 12:50:03下载
- 积分:1
-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1
-
des,c环境下的,希望站长早日通过,贵站的宝贵资料对于我的学习有很大的帮助,感谢!
des,c环境下的,希望站长早日通过,贵站的宝贵资料对于我的学习有很大的帮助,感谢!-des, under the c environment, hoped stationmaster soon will
pass, the expensive station precious material will have the very big
help regarding mine study, the thanks!
- 2022-12-03 20:20:02下载
- 积分:1