登录
首页 » 加密解密 » sha密码检验的示例 希望对大家有 帮助

sha密码检验的示例 希望对大家有 帮助

于 2023-07-25 发布 文件大小:17.96 kB
0 117
下载积分: 2 下载次数: 1

代码说明:

sha密码检验的示例 希望对大家有 帮助-sha password test examples we hope to help

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • aadddddddddddddddddd
    DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDdddddddddddddddddddddddddddddddddddddddddddddd
    2022-07-21 16:50:27下载
    积分:1
  • ieee一种基于混沌的新方法An Image Encryption Scheme Based on Chaotic Map...
    ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security
    2022-05-30 11:41:05下载
    积分:1
  • RSA资料全集是我在学习RSA时收集的资料,它对我学习这种算法有着极大的帮助,不知对大家有帮助没有,希望对大家学习码学有所帮助。...
    RSA资料全集是我在学习RSA时收集的资料,它对我学习这种算法有着极大的帮助,不知对大家有帮助没有,希望对大家学习密码学有所帮助。-All of the information of RSA was collected when i was studying RSA.It gives me a great deal of help though i don t know how about you.I wish it also give you some help about the cryptology.
    2023-02-04 18:00:03下载
    积分:1
  • microsoft2007的下载匙。用它来安装。否则无法安装microsoft2007
    microsoft2007的下载密匙。用它来安装。否则无法安装microsoft2007-Key microsoft2007 download. Use it to install. Otherwise it is impossible to install microsoft2007
    2022-10-05 18:40:02下载
    积分:1
  • vb中实现的md5
    vb中实现的md5-vb achieve the md5
    2023-01-25 12:05:04下载
    积分:1
  • 文件算法+VB源代码,值的初学者研究,深入
    文件加密算法+VB源代码,值的初学者研究,深入-File encryption algorithm+ VB source code, the value of research for beginners, in-depth
    2023-03-10 01:00:04下载
    积分:1
  • ENIGMA3模拟WW II算法(含EXE文件)
    ENIGMA3模拟WW II加密算法(含EXE文件)-ENIGMA3 simulation WW II Encryption Algorithm (including EXE)
    2023-08-20 15:35:03下载
    积分:1
  • 条形码编码算法,可以输出多种形式条码
    条形码编码算法,可以输出多种形式条码-barcode coding algorithm, can output multiple forms barcode
    2022-01-25 21:40:49下载
    积分:1
  • KEELOQ_ENcode 简单的程序,可惜就是没有源代码。
    KEELOQ_ENcode 简单的加密程序,可惜就是没有源代码。-KEELOQ_ENcode simple encryption program, but is not the source code.
    2023-07-13 18:30:03下载
    积分:1
  • This is a very good article on the RSA, and I hope to help you!
    这是一篇很好的有关RSA的文章,希望对大家有所帮助!-This is a very good article on the RSA, and I hope to help you!
    2022-02-05 17:49:44下载
    积分:1
  • 696518资源总数
  • 105895会员总数
  • 18今日下载