资源列表
jiamiyuanmaheji
- 加密源码合集,包括RSA、IDEA等,功能比较强大-Collection source encryption, including RSA, IDEA, etc., the more powerful features
vbaexcel
- 用说明:所有用户名密码都是123,单击需打开表格,再点“打开表格”,表格里的名称与年号可随便改成自己所需要的。正式版本拥有完全权限,可添加更多的表格、用户名、修改密码和设置权限等-Using Note: All user name password is 123, click to open the form required, and then point " Open Form" in the name of the table can be easily changed
bl_des_test
- 使用dll,将vc下进行文件加解密的blowfish方法做成dll文件,从而在vc中调用,隐藏加解密的参变量。-Using dll, under the vc the blowfish file encryption method made dll file, so call in vc, the hidden variable encryption and decryption of the parameters.
polarssl-0.12.1-gpl.tar
- PolarSSL is a light-weight open source cryptographic and SSL/TLS library written in C. PolarSSL makes it easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) applications with as little hassle as possible. Loose c
code300
- 300个加解密的集合程序,c/c-300 a collection of encryption and decryption procedures, c/c
socket
- 基于VC实现的局域网信息传输过程,及加密解密-Based on the realization of the VC local area network information transmission process, and encryption and decryption
yymmxue
- 密码学文献有一个奇妙的发展历程,当然,密而不宣总是扮演主要角色。第一次世界大战前,重要的密码学进展很少出现在公开文献中,但该领域却和其它专业学科一样向前发展。-cryptography literature has a wonderful history, of course, close does not declare always played the leading role. Before the First World War, it was important to cryptog
IAREW8051V7.30B_cracked
- EW8051-EV的破解工具 IAR软件可用于编写工程 本文件就用来对其破解-EW8051-EV' s cracking tools IAR software can be used for the preparation of their project to break this document
RsaDllAndTest
- 利用大数库写的一个RSA模幂运算的小软件,该软件能够方便的进行RSA模幂运算,并且可以让读者学习大数库的使用方法。-Use of large numbers of a library to write a small RSA Modular Exponentiation software, the software can easily be RSA modular power, and large numbers can help readers learn to use the librar
testSCRATE
- 非对称加密,以RSA算法为例,实现数据的加密解密,有完整的算法。本程序只是简单的示例。不包含网络环境。-Asymmetric encryption, RSA algorithm, for example, data encryption and decryption, a complete algorithm. This program is just a simple example. Does not include the network environment.
300jiami
- 300中加密方法,例如比较流行的blowfish,md5加密等用c语言编写
EncodingandDecoding
- 本书讲述Windows环境下的加密与解密技术。这本书采用循序渐进方式, 从基本的跟踪调试到深层的拆解脱壳,从浅显的注册码分析到商用软件保 护,这500多页的一部书,几乎囊括了Windows下的软件保护的绝大多数内 容。-book on the environment of Windows encryption and decryption technology. This book step-by-step approach, from basic to the deep track
