登录
首页 » 加密解密 » LZW算法基于转换串表(字典)T,将输入字符串映射成定长(通常为12位)的码字...

LZW算法基于转换串表(字典)T,将输入字符串映射成定长(通常为12位)的码字...

于 2023-02-11 发布 文件大小:4.72 kB
0 108
下载积分: 2 下载次数: 1

代码说明:

LZW算法基于转换串表(字典)T,将输入字符串映射成定长(通常为12位)的码字-LZW algorithm is based on converting Series (dictionary) T, the input string mapping into fixed-length (usually 12) the code word

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论


0 个回复

  • rc5 c语言源代码。可修改性强。适合学习调试使用~
    rc5 c语言源代码。可修改性强。适合学习调试使用~-rc5 c language source code. May amend the strong. Study for debugging use ~
    2023-03-22 19:15:03下载
    积分:1
  • jcrypt,看看有没有人需要,分享给大家
    jcrypt加密,看看有没有人需要,分享给大家-jcrypt encryption, see no need for everyone to share
    2022-10-03 08:50:03下载
    积分:1
  • 一个简单的cpp程序,接收一个文件,没有一点
    A simple cpp program, that receives a file, does a bit-wise "not" for every character, and adds "not" to the extension. Repeated running does the same and removes the "not" from extension. This a "pseudo-encryption", but very useful to avoid automated filtering software. This way it is possible to send "exe" files (or anything else) without the emails being blocked... First - send the source code, have your (enlightened) recipient compile it, then send the "notted" file. The code is not very efficient though, I only had 30 minutes to invest... :)-A simple cpp program, that receives a file, does a bit-wise "not" for every character, and adds "not" to the extension. Repeated running does the same and removes the "not" from extension. This is a "pseudo-encryption", but very useful to avoid automated filtering software. This way it is possible to send "exe" files (or anything else) without the emails being blocked... First - send the source code, have your (enlightened) recipient co
    2022-08-10 05:54:26下载
    积分:1
  • ProGuard5.2.1含源代码,完全可编译执行
    Proguard是强大的Java字节码混淆器,含有源代码,可以根据自己需求修改编译。满足自身需求。 也可以作为爱好者自学的好材料。
    2022-01-26 03:52:01下载
    积分:1
  • Java environment of the four classical encryption algorithm, displacement, affin...
    JAVA环境下的四种古典加密算法,移位,仿射,维吉尼亚,置换 详细的WORD设计文档,里面包含源码和运行程序截图-Java environment of the four classical encryption algorithm, displacement, affine, Virginia, WORD replacement detailed design document, which contains the source code and operating procedures screenshots
    2022-08-04 02:38:10下载
    积分:1
  • 关于pe文件的汇编语言
    关于pe文件的汇编语言-on pe language compilation of documents
    2022-10-04 22:10:03下载
    积分:1
  • c++ to write the md5 encryption algorithm, easy to transplant md5 encryption
    c++写的md5加密算法,易于移植 md5加密-c++ to write the md5 encryption algorithm, easy to transplant md5 encryption
    2022-06-19 07:25:14下载
    积分:1
  • a generation of news summary of the procedures can be used to verify the source...
    一个java语言下的生成消息摘要的程序,可用于验证来源和确定身份-a generation of news summary of the procedures can be used to verify the source and identification
    2022-08-10 12:54:40下载
    积分:1
  • 工商银行 PCSC 智能卡读取程序示例
    基于 金邦达Gem USB KEY 的工商银行 PCSC 智能卡读取程序示例。自定义 APDU 命令交互,读取智能卡数据
    2022-05-19 02:50:13下载
    积分:1
  • 多种对称算法,非对称算法,散列算法的库函数
    多种对称加密算法,非对称加密算法,散列算法的库函数-13 hash algorithms: MD2, MD4, MD5, SHA-1, SHA-2(256, 384, 512), RIPEMD128, RIPEMD160, RIPEMD256, RIPEMD320, PANAMA, TIGER 4 checksum algorithms: CRC16, CRC16C, CRC32, ADLER32 12 HMAC algorithms: MD4-HMAC, MD5-HMAC, SHA1-HMAC, SHA256-HMAC, SHA384-HMAC, SHA512-HMAC, RIPEMD128-HMAC, RIPEMD160-HMAC, RIPEMD256-HMAC, RIPEMD320-HMAC, PANAMA-HMAC, TIGER-HMAC.
    2022-01-20 23:23:34下载
    积分:1
  • 696518资源总数
  • 104863会员总数
  • 25今日下载