-
DES算法介绍
DES算法介绍 -DES algorithm introduced
- 2022-06-17 17:24:26下载
- 积分:1
-
Compare Two Files HMACSHA1 VB 2005
Compare Two Files HMACSHA1 VB 2005
- 2022-03-13 01:07:44下载
- 积分:1
-
RC5算法文档
RC5 algorithm document
- 2022-03-06 07:14:24下载
- 积分:1
-
apply encryption and hash algorithm of RSA, DES and MD5 etc.
提供rsa、 des、 md5等加密和hash算法-apply encryption and hash algorithm of RSA, DES and MD5 etc.
- 2022-05-25 03:35:43下载
- 积分:1
-
标准C++书写的BlowFish加密算法,和加密文件演示,速度较快
标准C++书写的BlowFish加密算法,和加密文件演示,速度较快-written in standard C BlowFish encryption algorithm, and encryption paper presentations, faster
- 2022-03-07 10:15:31下载
- 积分:1
-
快速MD5碰撞生成器,王小云改进版。这个生成器根据“构造前缀碰撞法”可以生成两个不同的文件,而这两文件的md5 sum却是一样的。
MD5 Colli...
快速MD5碰撞生成器,王小云改进版。这个生成器根据“构造前缀碰撞法”可以生成两个不同的文件,而这两文件的md5 sum却是一样的。
MD5 Collision Generator(win32 .exe)
MD5 Collision Generator(source)
-Fast MD5 collision generator, Xiaoyun Wang, improved version. The generator according to "construct the prefix collision" system can generate two different files, while the md5 sum of these two documents is the same.
MD5 Collision Generator (win32.Exe) MD5 Collision Generator (source)
- 2022-02-01 22:44:01下载
- 积分:1
-
提供加密的聊天程序。使用对称加密算法…
提供加密的c/s 聊天程序。用到对称加密算法和非对称加密算法,实现客户服务器的安全聊天-Provide encrypted c/s chat program. Using symmetric encryption algorithms and asymmetric encryption algorithms, to achieve the security of client-server chat
- 2022-05-21 16:34:45下载
- 积分:1
-
LibTomCrypt是一个全面的、可扩展的密码学函数库。包括了各类主要的加密函数,单向摘要函数,伪随机数生成器,公钥加密函数。
你可以在这里下载到源文件及...
LibTomCrypt是一个全面的、可扩展的密码学函数库。包括了各类主要的加密函数,单向摘要函数,伪随机数生成器,公钥加密函数。
你可以在这里下载到源文件及其说明:http://www.libtomcrypt.org
libtomcrypt在C++builder6下编译为tomcrypt.lib
-LibTomCrypt is a comprehensive, scalable cryptography libraries. Including the major types of encryption function, the one-way function summary, the pseudo-random number generator, public key encryption function. You can download the source of the document and its Note : http :// in C www.libtomcrypt.org libtomcrypt builde r6 compiler for tomcrypt.lib
- 2022-10-03 23:55:03下载
- 积分:1
-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1
-
这是脱壳 PE
这是脱壳 PE-ARMOR 的程序源代码汇编的-PE-ARMOR the source code compilation
- 2022-08-20 11:11:02下载
- 积分:1