登录
首页 » 加密解密 » File Encryption Utility (using Blowfish encryption algorithm to document the int...

File Encryption Utility (using Blowfish encryption algorithm to document the int...

于 2022-07-24 发布 文件大小:148.67 kB
0 165
下载积分: 2 下载次数: 1

代码说明:

File Encryption Utility(使用Blowfish算法给文件加密的完整程序)VC 源代码-File Encryption Utility (using Blowfish encryption algorithm to document the integrity of procedures) VC source code

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • Serpent encryption algorithm source code
    Serpent加密算法源代码-Serpent encryption algorithm source code
    2022-03-04 23:13:18下载
    积分:1
  • 关于Diamond算法的一个小程序
    关于Diamond算法的一个小程序-Diamond algorithm on a small program
    2022-08-11 00:11:47下载
    积分:1
  • rsa算法源码
    rsa加密算法源码-Source code of RSA encrypt algorithm
    2022-08-24 04:59:14下载
    积分:1
  • RSA算法
    实施一个小程序,以产生一对非对称密钥对要与RSA算法使用。
    2022-04-02 07:09:52下载
    积分:1
  • 极好的程序,DES的接班人,源码是DEHLPHI的Pascal,编译后可直接运行...
    极好的加密程序,DES的接班人,源码是DEHLPHI的Pascal,编译后可直接运行-Excellent encryption, DES s successor, is DEHLPHI source of Pascal, the compiler can be run directly
    2023-07-04 04:20:02下载
    积分:1
  • 替换C#动态链接库引用
    用来替换动态链接库的相互引用关系,去掉强签名请求。
    2023-07-26 02:15:03下载
    积分:1
  • tuyecrypt
    凸出扫描
    2023-02-05 17:05:04下载
    积分:1
  • md5--文件
    MD5 算法描述 对 MD5 算法简要的叙述可以为:MD5 以 512 位分组来处理输入的信 息,且每一分组又被划分为 16 个 32 位子分组,经过了一系列的处理后, 算法的输出由四个 32 位分组组成, 将这四个 32 位分组级联后将生成一个 128 位散列值。 在 MD5 算法中,首先需要对信息进行填充,使其字节长度对 512 求 余的结果等于 448。因此,信息的字节长度(Bits Length)将被扩展至 N*512+448,即 N*64+56 个字节(Bytes) ,N 为一个正整数。填充的方 法如下,在信息的后面填充一个 1 和无数个 0,直到满足上面的条件时才 停止用 0 对信息的填充。 请点击左侧文件开始预览 !预览只提供20%的代码片段,完整代码需下载后查看 加载中 侵权举报
    2023-03-04 16:05:03下载
    积分:1
  • 纠错编码算法,使用白
    Error Correcting Code algorithms, for use whit E
    2023-02-08 01:45:04下载
    积分:1
  • ieee一种基于混沌的新方法An Image Encryption Scheme Based on Chaotic Map...
    ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security
    2022-05-30 11:41:05下载
    积分:1
  • 696516资源总数
  • 106914会员总数
  • 0今日下载