登录
首页 » 加密解密 » Weather radar echo generated for this code is its own no problem, I used

Weather radar echo generated for this code is its own no problem, I used

于 2022-03-22 发布 文件大小:2.24 kB
0 265
下载积分: 2 下载次数: 1

代码说明:

天气雷达回波产生 这个代码是自己编的 我用过没什么问题-Weather radar echo generated for this code is its own no problem, I used

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • PB使用MD5,可以有效决PB开发中登录码使用明文的问题
    PB使用MD5加密,可以有效解决PB开发中登录密码使用明文的问题-PB using MD5 encryption, can effectively resolve the PB Password development issue of the use of explicit
    2022-03-18 03:23:53下载
    积分:1
  • LaoenED.com/LaoenED.exe for DOS/Windos9x/2k/XP LaoenED.exe for the user. A small...
    LaoenED.com/LaoenED.exe for DOS/LaoenED.exe for Windos9x/2k/XP的密码查看器。很小但当你忘了密码的时候很实用!-LaoenED.com/LaoenED.exe for DOS/Windos9x/2k/XP LaoenED.exe for the user. A small, but when you forget the password are very practical!
    2022-03-10 01:04:08下载
    积分:1
  • 一个用3DES文件的小测试程序!
    一个用3DES加密文件的小测试程序!-a document using 3DES encryption small test program!
    2022-07-11 06:57:51下载
    积分:1
  • pgp例子
    pgp加密例子 -pgp encryption example
    2022-07-13 18:34:28下载
    积分:1
  • several RSA DES algorithm C program should not miss
    RSA DES 等几个算法的C程序,不要错过-several RSA DES algorithm C program should not miss
    2022-05-24 04:34:43下载
    积分:1
  • 安全支持提供器接口(SSPI)源码
    安全支持提供器接口(SSPI)源码- Safe support provision connection (SSPI) source code
    2022-06-20 22:41:24下载
    积分:1
  • 用于GSM的A5算法实现
    用于GSM加密的A5算法实现- Uses in GSM the encryption A5 algorithm to realize
    2022-02-05 20:05:35下载
    积分:1
  • VC实现的图像算法,采用Arnold变换,对于初涉信息安全的人员有一定参考价值...
    VC实现的图像加密算法,采用Arnold变换,对于初涉信息安全的人员有一定参考价值-The algorithm of encrypted image completed in VC, applying the Arnold transform .It is valuable to people who will devote himself to infomation security
    2022-09-06 03:30:02下载
    积分:1
  • 1、 实验要求:用高级语言实现IDEA算法的
    1、 实验要求:用高级语言实现IDEA算法的加密-1, the experimental requirements: use of high-level language implementation of the IDEA encryption algorithm
    2022-01-25 14:17:49下载
    积分:1
  • 128192和256位钥的码Twofish的VHDL实现。
    VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.-VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some
    2022-07-08 23:33:44下载
    积分:1
  • 696516资源总数
  • 106914会员总数
  • 0今日下载