-
PB使用MD5加密,可以有效解决PB开发中登录密码使用明文的问题
PB使用MD5加密,可以有效解决PB开发中登录密码使用明文的问题-PB using MD5 encryption, can effectively resolve the PB Password development issue of the use of explicit
- 2022-03-18 03:23:53下载
- 积分:1
-
LaoenED.com/LaoenED.exe for DOS/Windos9x/2k/XP LaoenED.exe for the user. A small...
LaoenED.com/LaoenED.exe for DOS/LaoenED.exe for Windos9x/2k/XP的密码查看器。很小但当你忘了密码的时候很实用!-LaoenED.com/LaoenED.exe for DOS/Windos9x/2k/XP LaoenED.exe for the user. A small, but when you forget the password are very practical!
- 2022-03-10 01:04:08下载
- 积分:1
-
一个用3DES加密文件的小测试程序!
一个用3DES加密文件的小测试程序!-a document using 3DES encryption small test program!
- 2022-07-11 06:57:51下载
- 积分:1
-
pgp加密例子
pgp加密例子 -pgp encryption example
- 2022-07-13 18:34:28下载
- 积分:1
-
several RSA DES algorithm C program should not miss
RSA DES 等几个算法的C程序,不要错过-several RSA DES algorithm C program should not miss
- 2022-05-24 04:34:43下载
- 积分:1
-
安全支持提供器接口(SSPI)源码
安全支持提供器接口(SSPI)源码- Safe support provision connection (SSPI) source code
- 2022-06-20 22:41:24下载
- 积分:1
-
用于GSM加密的A5算法实现
用于GSM加密的A5算法实现- Uses in GSM the encryption A5 algorithm to realize
- 2022-02-05 20:05:35下载
- 积分:1
-
VC实现的图像加密算法,采用Arnold变换,对于初涉信息安全的人员有一定参考价值...
VC实现的图像加密算法,采用Arnold变换,对于初涉信息安全的人员有一定参考价值-The algorithm of encrypted image completed in VC,
applying the Arnold transform .It is valuable to
people who will devote himself to infomation security
- 2022-09-06 03:30:02下载
- 积分:1
-
1、 实验要求:用高级语言实现IDEA算法的加密
1、 实验要求:用高级语言实现IDEA算法的加密-1, the experimental requirements: use of high-level language implementation of the IDEA encryption algorithm
- 2022-01-25 14:17:49下载
- 积分:1
-
128192和256位密钥的密码Twofish的VHDL实现。
VHDL implementation of the twofish cipher for 128,192 and 256 bit keys.
The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.-VHDL implementation of the twofish cipher for 128,192 and 256 bit keys.
The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some
- 2022-07-08 23:33:44下载
- 积分:1