登录
首页 » 加密解密 » MD5的全称是Message

MD5的全称是Message

于 2022-08-23 发布 文件大小:6.21 kB
0 67
下载积分: 2 下载次数: 1

代码说明:

MD5的全称是Message-digest Algorithm 5(信息-摘要算法),用于确保信息传输完整一致。本程序是c语言版的md5加密解密源码!-The full name of MD5 is Message-digest Algorithm 5 (Information- Summary of algorithm), to ensure the integrity of the information transmission line. This procedure is the c language version of the md5 encryption source code!

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • md5是常用的算法,但是在vc中没有系统的类可以用。本程序完成了md5类,使用简单。不是国内网上流传的类。...
    md5是常用的加密算法,但是在vc中没有系统的类可以用。本程序完成了md5类,使用简单。不是国内网上流传的类。-md5 is a commonly used encryption algorithm, but in vc no class system can be used. This procedure was completed md5 categories, using a simple. Rather than domestic circulating online class.
    2023-06-24 19:00:04下载
    积分:1
  • 图汇编语言的沙算法
    PIC汇编实现SHA加密算法。在PIC16F73上实现-SHA ALGORITHM BY PIC assembly language
    2022-04-20 10:03:50下载
    积分:1
  • 将小于32位的码字用1011编程循环冗余码! 并且可以检验已编好的循环冗余码是否正确!...
    将小于32位的码字用1011编程循环冗余码! 并且可以检验已编好的循环冗余码是否正确!-Will be less than 32-bit code word to use Cyclic Redundancy Code 1011 programming! And can be tested has been a good cyclic redundancy code is correct!
    2022-07-07 03:38:58下载
    积分:1
  • COM文件
    COM文件加密 -COM document encrypts
    2022-03-11 20:30:03下载
    积分:1
  • LINUX下使用Ansi C编写的MD5消息散列算法
    LINUX下使用Ansi C编写的MD5消息散列算法-LINUX use Ansi C prepared news MD5 hash algorithm
    2023-08-26 05:15:03下载
    积分:1
  • An improved tabu search algorithm to solve knapsack problem. The algorithm is ba...
     提出一种改进的禁忌搜索算法来求解背包问题。该算法基于禁忌搜索技术,并采用I&D策略,同时设计了两种针对局 部最优解的变异算子。改进后的算法能有效地弥补标准禁忌算法对初始解依赖的缺陷,同时也避免了搜索停滞的现象。通过对具 体实例和随机问题的测试,表明改进后的禁忌搜索算法有更好的性能。 关-An improved tabu search algorithm to solve knapsack problem. The algorithm is based on tabu search techniques, using I & D strategies, while designed for the local optimal solution of the two kinds of mutation operator. The improved algorithm can effectively compensate for the standard tabu search algorithm depends on the initial solution defect, but also to avoid the phenomenon of search stagnation. Through specific examples and random-question test, indicating that the improved tabu search algorithm has better performance. Guan
    2022-01-31 13:51:44下载
    积分:1
  • aes算法实现,经过FPGA验证的!
    aes加密算法实现,经过FPGA验证的!-aes encryption algorithm, after FPGA validation!
    2022-06-14 10:23:40下载
    积分:1
  • AES IP core
    While there are many AES cores around, this one is designed with LUT6 based FPGA architecture in mind from day one.  The AES Decryption Core for FPGA implements the decryption portion of the AES (a.k.a. Rijndael) algorithm described in the FIPS-197 specification. Key lengths of 128 / 192 / 256 bits are supported, each with a separate instantiation wrapper. Since the core is designed to take advantage of LUT6 based FPGA archit
    2022-02-06 04:58:15下载
    积分:1
  • AES Crypto PIC Code Example
    AES Crypto PIC Code Example
    2022-03-04 05:57:43下载
    积分:1
  • DES(Data Encrypton Standard) 算法的实现网上已经有很多,本人在此讲述的是在DES算法过程中如何查看16迭代过程中生成的Ki,Li...
    DES(Data Encrypton Standard) 算法的实现网上已经有很多,本人在此讲述的是在DES算法加密过程中如何查看16迭代过程中生成的Ki,Li,Ri,Fi,Si等,这样可以当做一个DES加密对照器,这样可以方便的发现你在加密过程中出现的错误! -DES (Data Encrypton Standard) algorithm has been achieved online many, I would like to speak on is the DES encryption algorithm to see how the process 16 iterative process of generating Ki, Li, Ri, Fi, Si, etc., can serve as a control device DES encryption, this can easily find you in the process of encryption the mistakes!
    2022-02-03 17:27:13下载
    积分:1
  • 696524资源总数
  • 103939会员总数
  • 12今日下载