-
ECC
椭圆曲线的实现(ECC),椭圆曲线算法是代数几何、数论等多个数学分支的一个交叉点,一直被人们认为是纯理论学科。而椭圆曲线密码体制,是基于椭圆曲线离散对数问题的一种公钥密码体制(Realization of elliptic curves (ECC), elliptic curve algorithm is algebraic geometry, a number of mathematical intersection of number theory and other branches, has been considered a purely theoretical discipline. The elliptic curve cryptosystem is based on elliptic curve discrete logarithm problem as a public-key cryptosystem)
- 2014-05-09 19:32:34下载
- 积分:1
-
CUDA-AES
基于CUDA的AES快速加密解密文档,系统介绍饿AES算法的设计与优化(CUDA-based AES encryption and decryption of documents quickly, the system introduced hungry AES algorithm design and optimization)
- 2014-04-11 18:14:43下载
- 积分:1
-
hundunjiami
说明: 一个关于加密音频,图像的VB程序,功能还算可以,希望可以帮到人!!(One on encryption of audio, images VB program, function OK, the desire to help people! !)
- 2021-02-28 17:49:35下载
- 积分:1
-
Encrypt-your--program-by-U-disk
修改本程序中的U盘的序列号后,程序可以变成你自己的独立的U盘启动密匙, 只能你的U盘才能打开程序 不需要往U盘中存入任何文件,就可实现用U盘加密程序.只能通过你的U盘启动你的程序
程序中有详细的注释(Encrypt your program by a soul U-disk without saving anything in you disk
Modify the program, U-disk serial number, the program can become your own independent U disk key, only you can open U disk U disk does not need to deposit any file, can be achieved U disk encryption program)
- 2011-09-01 16:44:59下载
- 积分:1
-
sha-256
sha256的签名算法,纯C实现,已验证正确,在控制台上直接运行即可,(sha256 signature algorithm, pure C implementation ,has been verified properly and can be run directly on the console.)
- 2021-04-28 16:08:43下载
- 积分:1
-
Crypt_Vmpc
VMPC加密解密算法。已对x86优化,其他平台也可用。(VMPC encryption and decryption algorithms. Has been optimized for x86, other platforms are also available.)
- 2013-07-15 18:51:17下载
- 积分:1
-
h2
将天骄2服务端的加密文本文件与生成的软件放在同一目录下,点击批量转换,
完成后会在同目录下生成一个名为temp的文件夹,其中存放的就是转换后的文件.
因为加密和解密的规则完全相同,所以加密过程和解密过程相同,
也就是说如果原来的文件存放的是原文,转换后就会生成密文,如果原来是密文,转换后生成原文.
适用于天骄2,凤舞天骄的所有版本服务端.(The the Tianjiao 2 server encrypted text file in the same directory with the generated software, click on the batch conversion finished, it will generate a folder named temp in the same directory, which store the converted file encryption and decryption rules are identical, so the encryption and decryption process is the same, that is to say if the original file is stored in the original conversion will generate the ciphertext, if the original ciphertext, conversion generated text. apply to tianjiao, all of Fung Mo tianjiao, the version of the server.)
- 2013-04-27 11:47:04下载
- 积分:1
-
mAffineCipher
古典密码中的仿射密码的加密和解密用C语言来实现。(Classical affine password encryption and decryption using C language to achieve.)
- 2011-10-30 10:37:30下载
- 积分:1
-
Hash
MD5加密算法,实现报文认证!!运算速度快,兼容性好(MD5 encryption algorithm, message authentication realize! ! Computing speed, better compatibility)
- 2008-07-05 00:29:14下载
- 积分:1
-
HillCode
playfair 加密算法的实现,用一个例子做了展示(realize playfair algorithm,use a sample to show the algorithm)
- 2012-03-05 16:47:43下载
- 积分:1