资源列表
HAMMING_ECC
- HAMMING ECC,1 BIT ERROR CORRECTION, 2 BITS ERROR DETECTION -HAMMING ECC,1 BIT ERROR CORRECTION, 2 BITS ERROR DETECTION
jiamijiemi11
- 一个具有加密解密功能的源代码,可以用的,我用过的
gost前苏联加密标准
- gost前苏联加密标准,前苏联(现在的俄罗斯)的一中加密解密的源代码。-GOST encryption standards the former Soviet Union, the former Soviet Union (now Russia), a Chinese encryption and decryption of the source code.
hill
- HILL的一个C代码,经调试过为可用的,希望与大家分享下哈-HILL, a C code that can be used by the debug-off, and I hope to share with you under the Kazakhstan
md5
- MD5算法源码,包含算法的实现源码和测试码,可将不定长信息映射到定长信息,可用于软件加密系统中-MD5 algorithm source code, including the algorithm and test source code, variable length information can be mapped to the fixed-length information can be used for software encryption system
ascii
- 实现128位的AES加密解密功能,可以是任意长度的字符,在ECB模式下处理的-Achieve 128-bit AES encryption and decryption functions can be any length of characters processed in ECB mode
RSA
- RSA加密和解密算法实现。其中公钥私钥对随机生成,可实现对明文的加密及解密。- The realization of RSA encryption and decryption algorithm. The public and private key pair is generated randomly, and can realize the encryption and decryption of the plai
iconv
- 实现将一种已知的字符集文件转换成另一种已知的字符集文件。-Implementation will convert a known character set file into another file known character set.
DES
- DES算法为密码体制中的对称密码体制,又被成为美国数据加密标准,是1972年美国IBM公司研制的对称密码体制加密算法。其密钥长度为56位,明文按64位进行分组,将分组后的明文组和56位的密钥按位替代或交换的方法形成密文组的加密方法。 -DES algorithm in symmetric key cryptography system, also known as the United States Data Encryption Standard, was developed in 197
DES
- C++语言的DES加密解密算法实现,并附有详细注释-The C++ language DES encryption and decryption algorithm, detailed notes
Des加密的实现
- DES编码 实现对数据的加密 种加密的算法的集合,有DES,RSA等等,有的是用C写的,也用是用VC++写的。很实用! -DES encryption of data encryption algorithm types of pools, DES, RSA, etc., some written in C, is also used to write the VC. Very practical! The types of encryption algorithms to assemble,
md5
- MD5即Message-Digest Algorithm 5(信息-摘要算法 5),用于确保信息传输完整一致。是计算机广泛使用的杂凑算法之一(又译摘要算法、哈希算法),主流编程语言普遍已有MD5实现。-The MD5 Message-Digest Algorithm 5 (Information- Digest algorithm 5) is used to ensure complete and consistent information transmission. Is one of t
