-
vb写的rsa加密算法
vb写的rsa加密算法-vb wrote rsa encryption algorithm
- 2022-08-17 07:48:35下载
- 积分:1
-
delphi file crypter full source code
delphi file crypter full source code
- 2022-08-13 03:30:27下载
- 积分:1
-
Recursive-subroutine
该程序使用C++写的一个基于递归子程序算法的语法翻译器,是在vs2012环境下编写的,供大家参考和学习(The program uses C++ to write an algorithm based on recursive subroutine syntax interpreter is written in vs2012 environment, for your reference and learning)
- 2013-11-26 23:12:15下载
- 积分:1
-
fangsemima
仿射密码体制加解密,较移位代换等加解密体制,更加优越。(Affine cipher encryption and decryption, a shift substitution and encryption and decryption system, more superior.)
- 2011-12-19 19:58:14下载
- 积分:1
-
SPSA
经典的SPSA算法,该算法寻优较快,算法效率高,特别是对高维的函数求最优解有独特的优势.(Classic SPSA algorithm, the algorithm optimization and faster, the high efficiency of the algorithm, the optimal solution for high-dimensional function has a unique advantage.)
- 2021-04-06 17:49:02下载
- 积分:1
-
我用C#做的一个对字符串加密的程序,加密对象为26个字母大小写和0到9的数字,实现的是替代法...
我用C#做的一个对字符串加密的程序,加密对象为26个字母大小写和0到9的数字,实现的是替代法-I used C# do a strings encryption procedures, encryption targeted at 26 case-sensitive alphanumeric 0-9 and figures to achieve the substitution
- 2022-01-25 18:38:23下载
- 积分:1
-
bmp图像的加密
bmp图像的加密-bmp image encryption
- 2022-01-26 05:19:09下载
- 积分:1
-
动画介绍aes的详细步骤,生动简单,是很容易理解的动画演示,很好...
动画介绍aes的详细步骤,生动简单,是很容易理解的动画演示,很好-Animation aes detailed steps, vivid simple and is very easy to understand animation, very good
- 2023-03-15 10:05:04下载
- 积分:1
-
量子密钥分发密钥率仿真MATLAB代码
说明: 量子密钥分发是安全分发密钥的一种方式,文件包含其密钥率和传输距离的仿真代码,包含各类协议的比较,直接运行即可,非常有用的资料。。。。(Quantum key distribution (QKD) is a way of secure key distribution. The file contains the simulation code of key rate and transmission distance, and the comparison of various protocols. It can be run directly and is very useful information.)
- 2021-04-22 11:48:49下载
- 积分:1
-
ASFDSAF
题目:某个公司采用公用电话传递数据,数据是四位的整数,在传递过程中是加密的,加密规则如下:
每位数字都加上5,然后用和除以10的余数代替该数字,再将第一位和第四位交换,第二位和第三位交换。
1.程序分析:
2.程序源代码:(Topic: a company USES the public telephone relay data, data is four integers, in the relay in the process is encrypted, encryption rules are as follows:
Each Numbers add 5, then use and divided by the number of 10 instead of a remnant, then the first and fourth exchange, the second and third exchange.
1. The program analysis:
2. The source code:)
- 2012-05-26 20:07:28下载
- 积分:1