登录
首页 » 加密解密 » Crypton algorithm realization.

Crypton algorithm realization.

于 2022-09-05 发布 文件大小:2.64 kB
0 173
下载积分: 2 下载次数: 1

代码说明:

Crypton algorithm realization.

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • Designing of Bit serial type Galois Field GF(2m) Multiplier
    2023-04-19 09:45:03下载
    积分:1
  • twocrypt(2c)是一个 PoC工具,用于超狂妄者。它把两个文件成一个。不同的口令可以用于译不同的变量。输出不能从单个文件中识别出来,并且这个工
    twocrypt(2c)是一个 PoC工具,用于超狂妄者。它把两个文件加密成一个。不同的口令可以用于解译不同的变量。输出不能从单个加密文件中识别出来,并且这个工具使用一种合法的算法,这种算法本身并不意味着要隐藏任何信息。-twocrypt (2c) is a PoC tool, uses in the ultra arrogance. It encrypts two documents. The different password may use in the solution to translate the different variable. The output cannot from individually encrypt in the document to distinguish, and this tool uses one legitimate algorithm, this algorithm itself certainly did not mean must hide any information.
    2022-11-27 16:40:03下载
    积分:1
  • AES算法的实现,大家可以参考一下看看。
    AES算法的实现,大家可以参考一下看看。-AES algorithm, we can refer you to see.
    2023-03-27 14:30:03下载
    积分:1
  • 是啊 10 点
    包含的.m 文件那土窖使用 RSA Algorihtme 所以享受它只笑着现在这由创建的 hahahahahhahahahhah"肖恩 · 戈麦斯"大家伙从我不知道请结束 100 字符:)
    2023-01-25 11:35:04下载
    积分:1
  • 本软件是根据DES算法,编成的应用程序。
    本软件是根据DES加密算法,编成的应用程序。-software is based on the DES encryption algorithm into the application.
    2023-05-06 01:40:02下载
    积分:1
  • 在完整的RSA算法/ *** lt;gt;部分:RSA lt;/ gt;* lt;gt;…
    关于RSA算法的完整性/***lt;Pgt;部分:RSA lt;/Pgt;*lt;Pgt;描述:Encodage de donn idle s selon le protocole RSA lt;/Pgt;*lt;Pgt;版权所有:Copyright(c)2004lt;/Pgt;*@author Fran正在继续Bradette**@version 1.1 version originale de Robert Sedgewick and Kevin韦恩。版权所有2004*pris sur le现场http://www.cs.princeton。*修饰语edu/introcs/104crypto/RSA.java.html文件帕弗兰在继续,布拉德特*/
    2022-04-19 13:24:23下载
    积分:1
  • Internet上的PIK算法源程序
    Internet上的PIK加密算法源程序-on the Internet PIK encryption algorithm source code
    2022-12-04 09:35:02下载
    积分:1
  • VHDL把图片移动到星号码上码的原形就看到啦.zip]
    VHDL把图片移动到星号密码上密码的原形就看到啦.zip] - 程序里有一个张图片.把图片移动到星号密码上,密码的原形就看到啦 [QQ 2005贺岁版登录口令加密算法及其源代码.rar] - QQ 2005贺岁版登录口令加密算法及其源代码,请大家指教 [各cracked软件的安装方法.rar] - 各种开发用常用软件的破解安装方法 非常值得收藏的好东西-VHDL Pictures moved to the asterisk password on the password will see it when prototype. Zip]- is a procedure Lane photo. Pictures moved to the asterisk password, Password prototype will see it when [QQ 2005 Hesuiban login password encryption algorithm and its source code. rar]- QQ 2005 Hesuiban login password encryption algorithm and its source code, Please enlighten [the cracked software installation method. rar]- all commonly used in the development of software security crack installation method is very worthwhile collection of good things
    2022-04-21 19:45:54下载
    积分:1
  • Base64 算法(Author 蒋柏良 Jerry Jiang)
    Base64 加密算法(Author 蒋柏良 Jerry Jiang)-* * DESCRIPTION * Base64 processes input in 24bit chunks by converting each chunk into 4 * bytes of output. It does so by splitting input into four 6bit groups and * using these as indexes in the following substitution table- * const char base64_map[] = * "ABCDEFGHIJKLMNOPQRSTUVWXYZ" * "abcdefghijklmnopqrstuvwxyz" * "0123456789+/" * If an input is not a multiple of 3 bytes, it s padded with zeros. In * this case the output bytes that consist entirely of the pad data are * replaced with = . * * Example * An input of 0x00 0x45 0xF2 is equivalent to 00000000 01000101 11110010 * bit sequence, which s then split into 000000 000100 010111 110010 * and these are substituted to produce the following base64 encoding * A E X y * * RETURN VALUE * b64_length() should return output length for the input of len bytes. * b64_encode() should encode len bytes from src int
    2022-07-18 16:55:26下载
    积分:1
  • 实现数据库安全编程,写了一个MD5的
    实现数据库安全编程,写了一个MD5的加密库-Database Security Programming realize, write a MD5 encryption library
    2023-02-02 21:45:04下载
    积分:1
  • 696518资源总数
  • 106215会员总数
  • 5今日下载