资源列表
fingerprint-overview
- Fingerprint Identification is the method of identification using the impressions made by the minute ridge formations or patterns found on the fingertips. No two persons have exactly the same arrangement of ridge patterns, and the patterns of any
AESClass4VB6
- AES加密類別FOR Visual Basic 6
DTproTest
- DTproTest滴水动态变形-飘功能例子.rar-DTproTest example DTproTest example
DecodeStrategy
- 本代码实现三种解密的策略,包括顺序查找法,折半查找法以及斐波那契查找法-This code decryption achieve three strategies, including sequential search method, binary search method, and the Fibonacci search method
hundunyingshe
- 基于混沌映射的图像加密算法是目前研究的主流,该本件中包含五类混沌映射,有一维混沌映射、二维混沌映射以及三个超混沌映射。- Image encryption algorithm based on chaotic map is mainstream research, which this piece contains five chaotic map, there is a one-dimensional chaotic maps, as well as three-dimensional c
CRYP_AESModes
- AES encryption for stm32f42xx This program able to encrypt (and decrypt data) with AES 128 bits.
DES1
- crypte Algorithme DES
SM2
- SM2加解密算法,使用openssl公开函数库编写实现。可进行加解密操作和数据签名以及身份认证操作-SM2 encryption algorithm
vcJieMiJi
- VC++产生程序序列号的实例代码,包括了一个简单的注册机程序和生成序列号的程序,两者结合完美演示如何在VC++开发的应用程序中实现软件注册功能。-VC++ serial number generator code examples, including a simple program and the program generates RI serial number, a combination that perfectly demonstrates how to implement sof
BlakeTaylor_SCM
- A free cell phone with Algorithm Windows and is verified to be the LiKB:\rHToy://I am I ma A://dontwakeupdontwakeupdontwakeupGuru BlakeTaylor_SCM mode.l-A free cell phone with Algorithm Windows and is verified to be the LiKB:\rHToy://I am I ma A://d
mima
- 基于c++ 的线性反馈移位寄存器的使用-Use c++ based linear feedback shift register
rc5
- rc5 encryption decryption in java
