资源列表
DES
- 可以在J2me下使用的DES加密算法,输入输出参数均为byte[],使用参数1加密,0解密。-J2me can use at the DES encryption algorithm, input and output parameters are byte [], using the parameters of one encryption, 0 decryption.
homework
- 3种用Java写的算法 其中包括了DES凯撒 编译软件用的是Intell J IDEA-Writing Java with three kinds of algorithms including DES Caesar are used to compile software Intell J IDEA
ZonaCritica
- Clase para administrar una zona critica realizada en C++. Contiene los metodos necesarios para entrar y salir de una seccion critica.
hcs301
- Keeloq技术简介 Keeloq技术是一种复杂的非线性加密算法,经它加密后的码称为滚动码,它的特点是保密性好、难以破译。Microchip公司以Keeloq技术为基础开发了滚动编码系列芯片,HCS301只是其中一款。 2
md5Andbase64
- md5 与 base64 算法的实现,采用vc、java、vb编写-md5 and base64 algorithm implementation, the vc, java, vb prepared
Encryption127461962002
- encrytion algorithms.
crypt
- 所有加密解密算法实现 任何人都可下载,非注册用户也可-the implementation of encrypt and decrypt
jtxor
- 程序使用C++展示相当强的XOR加密。 当它unencrypting文件时,包括EOF验错和自动侦查。程序很好被提供并且做在串类建立的好用法。-Program Uses C++ to Demonstrate A Fairly Strong XOR Encryption. Includes EOF error checking and automatic detection of when it is unencrypting a file. Program Is Documented
nvxor
- 写专属或加密程序。 程序应该采取作为输入由程序然后加密的文件名。 程序应该要求用户输入密钥,应该用于加密文件。 程序的输出应该进入一个文件以同一个文件名,但.ENC引伸。-Write an exclusive-OR encryption program. The program should take as input a filename that is then encrypted by the program. The program should ask the user to i
encryption
- 一个简单的算法 实现字符按规则加密与解密对应关系:abcdefghijklmnopqrstuvwxyz qwertyuiopasdfghjklzxcvbnm 例如 abc加密变成qwe-A simple rule-based algorithm characters corresponding to the relationship between encryption and decryption: abcdefghijklmnopqrstuvwxyz qwertyuiopasdfg
base64
- Base64是网络上最常见的用于传输8Bit字节代码的编码方式之一,大家可以查看RFC2045~RFC2049,上面有MIME的详细规范。本程序是c语言版的base64加密解密源码!-Base64 is the most common network for the transmission of byte code 8Bit encoding one of the ways everyone can see RFC2045 ~ RFC2049, detailed above, there is
md5
- MD5的全称是Message-digest Algorithm 5(信息-摘要算法),用于确保信息传输完整一致。本程序是c语言版的md5加密解密源码!-The full name of MD5 is Message-digest Algorithm 5 (Information- Summary of algorithm), to ensure the integrity of the information transmission line. This procedure is the c
