资源列表
mimaliluncyuyan
- 密码理论c语言,对密码理论进行介绍并对其实现进行分析-password theory c language, the code theory, introduced and achieve its analysis
An-Introduction-to-Cryptography
- 加密基础,密码学介绍中文第二版(An Introduction to Cryptography)-Based encryption, cryptography introduces Chinese Second Edition (An Introduction to Cryptography)
AES
- 密码学 AES算法的代码实现 包括加密和解密过程-AES cryptographic algorithm code, including encryption and decryption process
crypt
- 一个优秀的加密库源代码 支持多种加密算法 很不错 推荐-An excellent encryption library source code is a good recommendation
libtomcrypt1.17sourcecode
- 全功能的加密库,对称加密,非对称加密,单向加密,等待,最新版本-Full-featured encryption library, symmetric encryption, asymmetric encryption, one-way encryption, to wait, the latest version
TrueCrypt-7.0a-Source.tar
- 驱动加密软件,可以加密硬盘\分区,设定隐藏分区,加密隐藏分区-Drive encryption software that can encrypt hard disk \ partition, set the hidden partition, hide partition encryption
Wrap
- oracle存储过程加密工具 oracle存储过程加密工具 -oracle stored procedure encryption tools
rsa
- RSA算法实现,用C++语言实现大数类的构建,可以实现RSA算法加解密文本文件及二进制文件及图像,速度较快-将中文译成英语 RSA algorithm, using C language class structure of large numbers, RSA algorithm for encryption and decryption can text file and binary files and images, faster
okdes
- 一个 des base64 md5 等多种加密算法的实现程序,已经测试通过,vc++6.0 实现,适用于任何系统-A des base64 md5 encryption algorithm such as the realization of a variety of procedures have been tested, vc++6.0 to achieve, is applicable to any system
DES
- 模拟DES算法,程序使用八位密钥。 2. 程序使用 输入:输入明文,输入8位密钥。 点击“加密”按钮,即可获得加密密文。 输出:在编辑框中显示密文。 点击“解密”按钮,即可获得明文。 输出:在编辑框中显示明文。 -Simulation DES algorithm, the use of eight key procedures. 2. Procedures using input: enter explicitly, enter the 8-bit key. Cli
DataComeback
- 这是我在其它网上搜索得来的有关于数据恢复的书,我上传的都是本网站至今为止没有的资料,希望能对大家有所帮助."本人为了便于学习数据恢复,把网上的一些数据恢复知识做了个整理!顺便发到网上和大家分享! 大家如果看到有好的东西的话可以发给我,我再加到上面方便大家学习!" 欢迎大家来信跟笔者探讨各种电脑问题!特别是网络安全,加密与解密,系统~~等!-This is my online search in the other come the book on data recovery, I
de4dot-2.0.3
- C#反编译神器,基本上C#写的程序都能反编译。-de4dot is an open source (GPLv3) .NET deobfuscator and unpacker written in C#. It will try its best to restore a packed and obfuscated assembly to almost the original assembly. Most of the obfuscation can be completely restore
