登录
首页 » 加密解密 » 后工具烘干机烘干就 鬼画符规划覆盖

后工具烘干机烘干就 鬼画符规划覆盖

于 2023-04-03 发布 文件大小:1.49 kB
0 259
下载积分: 2 下载次数: 1

代码说明:

后工具烘干机烘干就 鬼画符规划覆盖 -tools dryer sheets drying on the planning coverage plans cover sheets

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 简单的码的例子,使用VB的源码, 非常简单明了,希望大家喜欢。...
    简单的密码的例子,使用VB的源码, 非常简单明了,希望大家喜欢。-Simple Example of VB Source Code for Encrypt, Rudimentary encryption/decryption demo program
    2022-03-16 22:25:01下载
    积分:1
  • sha码检验的示例 希望对大家有 帮助
    sha密码检验的示例 希望对大家有 帮助-sha password test examples we hope to help
    2023-07-25 10:45:03下载
    积分:1
  • 是我设计的在DSB中隐藏语音的例子. 用ELANIX公司的SYSTEMVIEW打开运行. 其掩护信号和隐藏信号输入输出端均需设置语音源文件,比如自己录制...
    是我设计的在DSB中隐藏语音的例子. 用ELANIX公司的SYSTEMVIEW打开运行. 其掩护信号和隐藏信号输入输出端均需设置语音源文件,比如自己录制的声音.-I designed the DSB concealed voice example. ELANIX company with the SYSTEMVI EW open operation. their cover and concealment signal input and output signals required to set up voice source, For example, recording their voices.
    2022-07-24 12:24:23下载
    积分:1
  • KEELOQ_ENcode 简单的程序,可惜就是没有源代码。
    KEELOQ_ENcode 简单的加密程序,可惜就是没有源代码。-KEELOQ_ENcode simple encryption program, but is not the source code.
    2023-07-13 18:30:03下载
    积分:1
  • bloppy blowfish cryptography decrypts your data into jpeg files
    bloppy blowfish cryptography decrypts your data into jpeg files
    2022-01-26 04:41:50下载
    积分:1
  • 用VC++实现数字图象迭代混沌方法
    用VC++实现数字图象迭代混沌加密方法-with VC digital image iterative method Chaotic Encryption
    2023-06-02 22:55:02下载
    积分:1
  • Third
    第三代移动系统中以Kasumi为内核的另一加密算法-f8算法的VC++实现-Third-generation mobile system to Kasumi for kernel-f8 encryption algorithm to another algorithm VC++ Realize
    2022-01-27 20:14:13下载
    积分:1
  • des演示算法c++实现
    des演示算法c++实现-des algorithm demonstration implemented by C++
    2023-05-16 17:05:03下载
    积分:1
  • 6)jm.tar.gz是上述程序的程序包,包后产生一个安装程序install...
    6)jm.tar.gz是上述程序的程序包,解包后产生一个安装程序install-jm,运行 ./install-jm就能根据需求选择安装 退出安装程序,安装程序会被自行删除。 8) 以上各程序在RedHatLINUX7.2平台编译通过。 10)本程序仅供学习使用。-6) jm.tar.gz above is the procedure for packages, unpacks resulting from the installation of a procedure install-jm, run./Install- jm demand can choose to exit the setup program to install, the installer will be replaced. 8) The above procedure RedHatLINUX7.2 platform compile. 10) only to learn the procedures used.
    2022-12-20 09:30:04下载
    积分:1
  • 128192和256位钥的码Twofish的VHDL实现。
    VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.-VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some
    2022-07-08 23:33:44下载
    积分:1
  • 696518资源总数
  • 106161会员总数
  • 5今日下载