资源列表
ZHAOHULIN
- 程序LOCKF为808语言编制,稍加修改,即可作为一个子模块(须转换为OBJ文件格式)同FOR2 TRAN编译DBASE等应用程序链接 -procedures LOCKF 808 languages, slightly modified, may as a sub-module (to be converted to OBJ file format) with the mainly TRAN should compile such DBASE Links with procedures
Soft20060207145450460
- 用vb编的对文本的加密解密,比较好用,大家可以下载-vb series with the text of encryption and decryption, more convenient, you can try downloading
TestEnDeYC
- 一个aes的加密解密的简单的演示工程,现在还只能在debug模式下运行,release模式正在调试。-an encryption and decryption of the simple demonstration project is still only in debug mode, and release mode debugging.
TomCrypt
- 该压缩包中包括 tom的加密函数库及pdf说明 ,以及Rinick s ECC:椭圆曲线非对称加密密钥生成器 -the compression package includes tom encryption functions and pdf descr iptions and Rinick s ECC : Elliptic Curve asymmetric encryption key generator
TestAes
- aes算法的c++实现及其加密解密过程所需时间的测试,无解压密码-Aes Algorithm c achieve encryption and decryption process and the time required for testing, without extracting passwords
P-Pass
- 想知道程序是如何实现加密解密的嘛? 那么来下载去看看吧,简单易懂,不懂你砸我!-procedures want to know is how to achieve encryption and decryption of incorrect? So to download and end, simple, but not you hit me!
substitution-cipher
- The file is substitution cipher assistant.It Will display the ciphertext underneath the guessed plaintext.-substitution cipher assistant . It Will display the ciphertext underneath the guessed plaintext.
MD5_js
- MD5算法在js中的实现,用于jsp网页中的加密-js MD5 algorithm in the realization jsp page for the encryption
Rail_Fence_Tecknique
- 简单分栏式加密的算法,比较简单,供大家使用-simple columns encryption algorithm is relatively simple for everybody to use
DES_encode
- 完整的des加密算法程序,c++builder编译器编译-integrity of the DES encryption algorithm, c compile builder
cryptography_matlab_codes
- vigenere密码解密的matlab实现,编译环境:matlab-vigenere code declassified Matlab realized, build environment : Matlab
AES
- 通过这道程序的编写,进一步加深了对AES的理解,也了解了模块化设计的基本思想,编程的时候,把一个大任务分解是很重要的,针对相应的子任务所编写的一段功能独立的代码或一个功能模块,在程序设计时,我们可以把程序中功能相对独立的模块用函数来实现。这样做,不仅可以使程序条理清晰,便于维护。而且,通过重复使用某些函数,可以节省软件开发时间。对一个大问题先从一个大的全局上去考虑,分成几个大的模块,将每个大的模块进一步分解。该程序就是这样的思想,将加密分成三大步骤,对第二大步骤的9次循环的每次都要进行4个操作。