资源列表
z_De_Encrypt
- 这是一个加密解密算法的小程序,加密解密为对称算法。 加密算法使用替换模板和字符冗余,对每个字符的加密依规则分别生成子密钥,算法具有一定安全性,具体算法请见,算法说明.doc文件。 程序在vs.net2005下编译通过。-This is a small encryption and decryption algorithm procedure for symmetric encryption and decryption algorithm. Encryption algorithm to
Caesar_encode
- 实现移位密码(扩展凯撒密码),用键盘接收明文和密钥,屏幕打印密文。-Achieve translocation password (Extension Caesar password), use the keyboard to receive explicit and key, screen printing ciphertext.
Vigenere_encode
- 实现维吉尼亚密码,用键盘接收明文和密钥,屏幕打印密文。-The achievement of Virginia password, use the keyboard to receive explicit and key, screen printing ciphertext.
TIFF_files_encryption_and_decryption
- TIFF图形格式文件加密解密, 对学习图像的加密解密有一定的帮助.-TIFF graphics format file encryption and decryption of learning image encryption and decryption will certainly help.
dsao
- 黑客防线下载系统(http://www.hacker.com.cn/down) 感谢使用本软件,有任何疑问请访问黑客防线官方网站(http://www.hacker.com.cn)并提出。我们将尽快为您解决。 更多精品黑客工具请访问:www.hacker.com.cn/vip-Download hacker defense system (http://www.hacker.com.cn/down) thanks to the use of this software
TEA
- 可以实现16轮32轮等tea加密,可以用C语言进行修改-Can be achieved 16 32 such as tea encryption, can use C language to amend
3DES
- 3DES加解密算法源代码. 做为可逆算法,可用于很多信息加密的工程中,相信大家会用得上的。-3DES encryption algorithm source code. As a reversible algorithm, a lot of information can be used to encrypt the project, believe that you will be useful for.
U
- 常用加密解密算法,如des等,java语言实现-Commonly used encryption and decryption algorithms, such as des, etc., java language
project
- 完整可运行的DES3层加解密程序,是个妹妹写的毕业论文程序,完全自己写的,毕业生这下好了,网上是找不到的-Complete operational DES3 layer encryption and decryption procedures, is a sister of the thesis writing process, completely wrote it myself, graduates under this Well, is not found online
crc1
- CRC编码verilog代码,用于实现crc编码功能-CRC coding Verilog code for CRC encoding capabilities to achieve
editplus注册机源码
- Editplus 源代码注册机破解源代码,十分详细-Zhuceji crack Editplus source code source code, very detailed
javaMd5
- 利用java实现的MD5加密算法的实现,可以把些加密算法应用到自己的程序中-Java using MD5 encryption algorithm to achieve the realization of some encryption algorithm can be applied to their own procedures
