资源列表
access数据库加密有几法
- access数据库加密有几法,但用“设置安全机智向导”加密最为牢靠,又如何访问这样的数据库呢-access database encryption with a few laws, but "to provide a safety witty guide" the most secure encryption, how to access such a database?
AES
- 实现完整的AES加密解密,主要分为四步:S盒,行移位,列变换,密钥扩展- Achieve a complete AES encryption and decryption, divided into four steps: S box, row shift row conversion, key expansion
jianyijiamijiemi
- 对明文字符读取进行加密 可以对明文和密文进行销毁-Pairs of plaintext characters to read encrypted plaintext and ciphertext can be destroyed
borZoi-1.0.1.zip
- 椭圆曲线Elliptic Curve)加密算法(,Elliptic Curve Elliptic Curve) encryption algorithm (
AcegiSecurity
- AcegiSecurity学习资料,能快速有效的学习AcegiSecurity知识.-AcegiSecurity Study a data,Can the knowledge studying AcegiSecurity having effect rapidly
FilecompressionSourcecode
- 提供具有稳健加密功能算法的COM组件的生成源码,已经相关应用的源码。-Provides a robust encryption algorithm generating COM component source code, has been related to the application source code.
MD5RSA
- 用于帮助了解数字签名机制,相信会有人用到,希望对您有所帮助。-Digital signatures used to help understand the mechanism, I believe it was used, I hope for your help.
otp
- One Time Password Generation for mobile data transfer,
avs_aes_latest.tar
- AES algorithm decryption Encryption
DES_ATTACK
- 对DES的Rectangle攻击和Boomerang攻击-Rectangle Attack on DES, and the Boomerang Attack
DES.rar
- 运用DES算法的加密程序,可以加密文件,并能够将加密的密文解密成明文,Procedures for the use of DES encryption algorithm
