登录

s

于 2022-03-05 发布 文件大小:4.37 kB
0 208
下载积分: 2 下载次数: 1

代码说明:

s

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • DES算法的实现和演示,具体算法见网上,程序中有注释
    DES加密算法的实现和演示,具体算法见网上,程序中有注释-DES encryption algorithm and demonstrate the achievement of the specific algorithm see online, proceedings have Notes
    2022-02-05 04:18:56下载
    积分:1
  • 喷泉编码算法
    Fountain Encoding Algrothm
    2022-08-25 17:16:46下载
    积分:1
  • 3DES encryption utility
    3DES encryption utility
    2022-02-12 11:17:38下载
    积分:1
  • these two works mainly with a CSP. CSPTEST comparison was made mainly to the cha...
    这两个工程主要用CSP 1、CSPTEST 写的比较乱 主要是给当时一个朋友做参考调用的 完成非对称密钥的生成、导入、导出、加密、解密、对称的加密解密、签名、验证。 2、CSTTEST2 写的比前个好些,但是平时上班,下班自己也要写论文,所以花的时间也不太多,很多地方都偷懒了。比如文件大小我没有用NEW 而且指定了1024 有需要的朋友可以自己修改。这个工程主要是非对称的密钥的导出和导入,还有就是会话密钥的操作。-these two works mainly with a CSP. CSPTEST comparison was made mainly to the chaos when a friend called to refer to the completion of the non-symmetric key generation, importing and exporting, encryption, decryption, symmetric encryption and decryption, signature, the certification. 2, CSTTEST2 write better than in the previous months, but usually go to work and finish their own toilet paper so I spent the time is not too much, all of the lazy. For instance, file size I have not used the NEW 1024 and designated a need to amend their friends. The project mainly non-symmetric keys to the Export and Import, there is the session key operation.
    2022-03-21 02:06:35下载
    积分:1
  • 代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
    2023-06-18 10:00:03下载
    积分:1
  • shareloginmodule
    ShareLoginModule
    2023-09-03 19:10:04下载
    积分:1
  • DESC代码带执行程序
    DES加密C代码带执行程序-DES encryption with C code enforcement procedures
    2022-04-12 12:51:34下载
    积分:1
  • iTunes的饼干
    应用背景 ;在泰瑞MAA KI十字脉辛格关键技术jhoom巴拉酒吧 ;jhoom巴拉酒吧
    2022-04-24 19:19:51下载
    积分:1
  • CCITT并行CRC 16
    CCITT Parallel CRC 16-bit
    2022-04-21 00:41:49下载
    积分:1
  • 工商银行 PCSC 智能卡读取程序示例
    基于 金邦达Gem USB KEY 的工商银行 PCSC 智能卡读取程序示例。自定义 APDU 命令交互,读取智能卡数据
    2022-05-19 02:50:13下载
    积分:1
  • 696516资源总数
  • 106914会员总数
  • 0今日下载