资源列表
eccFile
- 椭圆曲线密码体制是公钥密码体制的一种实现方式,其密钥长度短、安全强度高、运算代价低,因而得到广泛研究和应用。-Ellipse Curve Cryptograph (ECC) is an implement of Public Key Cryptography. It is widely researched and used because of its advantages of shot private key, high security and low operation quantit
25345364747
- rsa算法。可实现加密与解密。很好的软件代码。-rsa algorithm. Encryption and decryption can be achieved. Very good software code.
pkcsshixian
- When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish) that
pkcs12readshixian
- pki技术实现,学习pki的绝好材料,下载有帮助啊。-technology pki, pki an excellent study materials, download ah helpful.
AES_Decrypt
- this an AES-decrpytion method without file handling with handling is in my next upload-this is an AES-decrpytion method without file handling with handling is in my next upload
Encryption
- This an aes encryption method its include file handling nd its jst simple nd efficient now editing will be required in this try this-This is an aes encryption method its include file handling nd its jst simple nd efficient now editing will be require
randBBS
- BBS伪随机序列产生器 可以生成伪随机序列 是流密码加密的方法之一-BBS pseudo-random sequence generator can generate pseudo-random encryption stream cipher sequence is one of the ways
ECC256_new
- 这个程序的功能是椭圆曲线加密算法对word文档进行加密-Function of this process is the elliptic curve encryption algorithm to encrypt word document
jianerchashu
- 建立二叉树 以便进行查找等功能 采用从文档中读取数据-For the establishment of binary tree used to find features such as data read from the document
officepassword
- 破解office 带有密码的文档,支持office 2003版-office password
soft
- 一种实现叠像术的代码,可以将一张图片的信息分散到三张图片中,三张图片通过叠加算法可以恢复原图信息-Stack as a technique to achieve the code, can be a picture of the information distributed among the three images, three images through the image stack algorithm can recover information
19854826MD5
- md5算法C++实现,通过一个测试程序实现MD5算法-md5 algorithm for C++ to achieve, through a testing procedure based on MD5 algorithm to achieve
