-
古典加密算法,vc实现
该软件实现了目前安全性较高的rsa加密算法
来自黑基。...
古典加密算法,vc实现
该软件实现了目前安全性较高的rsa加密算法
来自黑基。-Classical encryption algorithm, vc realize the software realize the current high security encryption algorithm rsa from the black base.
- 2023-08-23 18:10:03下载
- 积分:1
-
DES算法实现过程分析 之 C
这是jacobi迭代算法-iterative algorithm to caculate Jacobi(matrix?)
- 2022-08-20 17:12:01下载
- 积分:1
-
facilitate free and simple BASE64 codec
方便免费简单的BASE64编解码器
- 2022-10-02 01:15:03下载
- 积分:1
-
个人觉得很不错的简单代码,用很少的程序实现,非常值得一看...
个人觉得很不错的简单代码,用很少的程序实现,非常值得一看-in my view, it s a nice and simple code with a few program to achieve the aim. worth to take a look
- 2023-05-01 13:10:03下载
- 积分:1
-
DES算法程序,此程序为完整的程序,可以直接下载使用
DES算法程序,此程序为完整的程序,可以直接下载使用-DES algorithm procedure, this procedure for the complete procedure, can be directly downloaded using
- 2022-06-15 00:46:44下载
- 积分:1
-
完全解决了中文问题
完全解决了中文问题- Completely has solved Chinese problem
- 2022-08-12 14:56:35下载
- 积分:1
-
AES加密软件,用于加密当前文本框中的内容。TH…
AES加密软件,用于加密当前文本框中的内容。使用的是美国国家标准(也被ISO所采纳)最新加密算法AES。-AES encryption software, encryption for the current contents of the text box. The use of the American National Standards (also adopted by the ISO) the latest encryption algorithm AES.
- 2022-08-11 15:51:31下载
- 积分:1
-
文件中有说明,本程序主要提供了MD5算法的功能实现!
文件中有说明,本程序主要提供了MD5算法的功能实现!-Document has indicate that this procedure provides the main function of MD5 algorithm realize!
- 2022-03-13 13:36:05下载
- 积分:1
-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1
-
This is a cryptographic algorithm used rc1628, learning cryptography helpful ah.
这是密码学的一个常用算法rc1628,对于学习密码学很有帮助啊。-This is a cryptographic algorithm used rc1628, learning cryptography helpful ah.
- 2023-01-16 10:30:04下载
- 积分:1