-
DES encryption detailed documentation, source code. . . Worth about A
DES加密详细文档,有源码。。。值得一下阿-DES encryption detailed documentation, source code. . . Worth about A
- 2022-07-18 22:30:35下载
- 积分:1
-
AES加密源代码实例
AES加密源程序示例-AES encryption source code examples
- 2022-01-26 00:29:39下载
- 积分:1
-
信息隐藏软件JSteg在VC环境下的源代码
原本为Linux下的版本,现已修改至可在VS2008下编译。共有两个工程,CJpeg(隐藏)和DJpeg(提取)。E:JStegcjpeg 的目录2014/04/09 16:13 .2014/04/09 16:13 ..2014/03/19 12:39 3,905 bitsourc.c1997/06/01 20:44 131 bitsourc.h2014/04/02 11:03 863,232 cjpeg.ncb2014/03/12 12:39 875 cjpeg.sln2014/03/19 11:47 5,503 cjpeg.vcproj1992/08/07 19:02 &nb
- 2022-04-24 10:41:25下载
- 积分:1
-
Base64编解码程序
Base64编解码程序-Base64 code/decode program
- 2023-03-31 10:15:04下载
- 积分:1
-
3des 的c语言版
用于android jni的c语言版 3des算法
- 2022-03-02 05:11:16下载
- 积分:1
-
Kasumi加密算法,3GP通信加密标准。算法。
KASUMI加密算法,3GP通信加密标准。算法简单,适合调试学习使用-KASUMI encryption algorithm, 3GP communications encryption standard. Algorithm is simple and suitable for studying the use of debugging
- 2022-08-13 08:50:29下载
- 积分:1
-
including key disk production software, LIB, DLL encryption modules in various l...
包括密钥盘制作软件、LIB、DLL 加密模块 各种语言调用加密模块的例子程序、网络注册软件等-including key disk production software, LIB, DLL encryption modules in various languages called encryption module example, Web registration software
- 2022-04-12 13:10:22下载
- 积分:1
-
借助MIRACL大数运算库实现对共享软件的安全注册。
借助MIRACL大数运算库实现对共享软件的安全注册。-With large numbers MIRACL library to achieve the shared computing software security register.
- 2023-02-08 20:35:04下载
- 积分:1
-
basic_hook_cr0,一个hook cro寄存器源代码,有很重要的参考价值
basic_hook_cr0,一个hook cro寄存器源代码,有很重要的参考价值-basic_hook_cr0, a hook tis Register source code, a very important reference value
- 2022-02-09 12:42:59下载
- 积分:1
-
文件加密技术的案例文件加密技术很多,其中W
文件加密技术一例给文件加密的技术很多,其中又分为不同等级,以适合不同场合的需要.这里给出最简单的文件加密技术,即采用文件逐字节与密码异或方式对 文件进行加密,当解密时,只需再运行一遍加密程序即可.-file encryption technology to the case file encryption technologies lot, which will be divided into different levels, to suit the needs of different occasions. Here is the most simple file encryption technology, which adopts a case-by-byte file with the password or different ways to document encryption, decryption, only re-running again encryption procedures.
- 2022-07-03 17:37:15下载
- 积分:1