-
md5 encryption function running under iis Usage: 1: page 2 of the document cont...
md5的加密函数 iis下运行;
用法:
1:页面包含该文件
2:调用方法MD5(sMessage,stype)
例dim md_=md5("admin",32)
*注:最高32位。-md5 encryption function running under iis Usage: 1: page 2 of the document contains: call method MD5 (sMessage, stype) were dim md_ = md5 ( " admin" , 32)* Note: maximum 32.
- 2022-09-28 18:40:03下载
- 积分:1
-
一个密钥盘生成程序
一个密钥盘生成程序-a key-generating program
- 2023-07-29 16:05:03下载
- 积分:1
-
libGringotts是一个小型、易于使用的、完全线程的C语言库,最初为Gringotts开发。它的目的是将数据封闭在一个加密和压缩的文件中。它使用加密算法(
libGringotts是一个小型、易于使用的、完全线程的C语言库,最初为Gringotts开发。它的目的是将数据封闭在一个加密和压缩的文件中。它使用加密算法((RIJNDAEL 128/256, SERPENT, TWOFISH, CAST256, SAFER+, LOKI97, 用于加密的3DES, 以及哈希函数的SHA1和 RIPEMD-160)来确保数据尽可能安全,并允许用户对所有使用的加密、哈希函数和压缩算法有完全的控制。 -libGringotts is small, is easy to use, the entire line
regulation C language storehouse, at first is the Gringotts
development. Its goal is the data seal in an encryption and in the
compression document. It uses the encryption algorithm ((RIJNDAEL
12.8/256, million SERPENT, TWOFISH, CAST256, SAFER, LOKI97, uses in
3DES which encrypts, as well as Hasche function SHA1 and RIPEMD-160)
guarantee the data to be as far as possible safe, and the permission
user to all uses encryption, the Hasche function and the compression
algorithm has the complete control.
- 2022-01-31 22:59:14下载
- 积分:1
-
用Visual C++实现数字图像迭代混沌加密
用Visual c++实现数字图像迭代混沌加密-Using Visual c++ Realize digital image iterative chaotic encryption
- 2022-05-30 11:53:02下载
- 积分:1
-
aes算法java版,包含了源码和jar文件
aes算法java版,包含了源码和jar文件-Orangk"aes algorithm java version contains source and jar files
- 2023-04-30 04:25:04下载
- 积分:1
-
Converst a bit array into a single byte and vice versa
Converst a bit array into a single byte and vice versa
- 2023-08-06 04:00:02下载
- 积分:1
-
Third
第三代移动系统中以Kasumi为内核的另一加密算法-f8算法的VC++实现-Third-generation mobile system to Kasumi for kernel-f8 encryption algorithm to another algorithm VC++ Realize
- 2022-01-27 20:14:13下载
- 积分:1
-
这是用C编写的命令加密法算法,请大虾们指教。
这是用C编写的命令加密法算法,请大虾们指教。-This is prepared by using C commands encryption algorithm, please advise their shrimp.
- 2022-04-13 02:33:36下载
- 积分:1
-
各种反分析软件的手法,包括(反Dede,反单步跟踪,反SoftICE,Ollydbg,反静态分析,以及程序自身的CRC32效验等,对于初学者有很大的帮助.
各种反分析软件的手法,包括(反Dede,反单步跟踪,反SoftICE,Ollydbg,反静态分析,以及程序自身的CRC32效验等,对于初学者有很大的帮助.-Analysis of various anti-software approach, including the (Anti-Dede, anti-single-step tracking, anti-SoftICE, Ollydbg, anti-static analysis, as well as procedures for their own well-tested, such as CRC32, for beginners and has a great help.
- 2022-08-03 04:58:45下载
- 积分:1
-
pe文件2in1捆绑工具源代码!请用Delphi编译!
pe文件2in1捆绑工具源代码!请用Delphi编译!-pe paper in 1 tool bundled source code! Please use the Delphi compiler!
- 2022-03-16 19:31:06下载
- 积分:1