资源列表
jiakeji
- 原理:对Pe文件的.data节,.text节进行XOR加密,然后将带解密的Loader写入文件头和第一个段的开头之间,修改Entry Point使其指向Loader. 测试用例:使用vc6.0自动生成的mfc对话框应用程序。 参考文献:(1)def源码 (2)黑客调试技术揭秘 (3)yoda s protector源码
3des
- 3DES 算法的实现,实现3DES算法的源码和程序-3DES source code 3DES source code 3DES source code
jiakeji1
- 原理:对Pe文件的.data节,.text节进行XOR加密,然后将带解密的Loader写入文件头和第一个段的开头之间,修改Entry Point使其指向Loader. 测试用例:使用vc6.0自动生成的mfc对话框应用程序。 参考文献:(1)def源码 (2)黑客调试技术揭秘 (3)yoda s protector源码
buttoncell120
- fgghnmj nkkk .lkd / e / ooeie dkujjnd x kjuje -fgghnmj nkkk .lkd / e / ooeie dkujjnd x kjuje
ChaosApplicationsinSpeechPrivacy
- 混沌信号具有随机性、长期不可预测性和对初值的极端敏感等特性.-Chaos Applications in Speech Privacy
rsa
- java非对称加密RSA的工具类及其源代码-rsa
2286
- Similar to many technological developments, wireless sensor networks have emerged from military needs and found its way into civil applications. Today, wireless sensor networks has become a key technology for different types of ”smart environme
CSP
- 使用微软CAPI进行非对称密钥的生成、导入、导出、加解密的代码,可用于windows环境下的加解密开发-Microsoft CAPI for asymmetric key generation, import, export, code encryption and decryption can be used for encryption and decryption windows development environment
baseonbianhuanyu
- 基于变换域的信息隐藏技术,用VC++做的,希望对大家有帮助-Transform domain-based information hiding techniques, using VC++ Do you want to help
md5Encrypt
- 这是一个MD5Hash算法的改进版本,适当增加了算法的复杂度-MD5Hash This is an improved version of the algorithm, the algorithm appropriately increase the complexity
v1-1-5-10
- Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
Cryptix2.20
- 含有常用的一些加密标准算法实现- Includes the commonly used some encryption standard algorithms to realize
