- spsmd 图像的平面微分平方和能够反映图像高频分 量的能量
- FlingGallery 可拖动的基于FramLayout的滑屏界面
- Physical-Modeling-Tutorial-Exercises 用于辅助物理建模的工具箱
- nilai rekap pkl teknik informatika universita islam syarif hidayatullah jakarta semester 7 angkatan 2014
- surat permohonan pkl spp pkl teknik informatika universita islam syarif hidayatullah jakarta semester 7 angkatan 2014
- Surat_keterangan_Selesai_PKL SKL pkl teknik informatika universita islam syarif hidayatullah jakarta semester 7 angkatan 2014
资源列表
MD5_CLASS
- 将MD5算法进行类的封装,里面有介绍类的使用方法,便于学习加密解密算法-The MD5 algorithm class encapsulation, which has introduced the class to use, easy to learn encryption and decryption algorithm
RC4_c
- 用C语言win-tc环境下实现RC4算法,实现从键盘输入字符的加密与解密-Encryption and decryption of RC4
DES
- DES算法,描述的是DES算法的具体加密和解密过程-DES algorithm, descr iption of the DES algorithm for encryption and decryption process specific
IDEA
- 加密算法中的IDEA算法源代码,使用C语言实现-IDEA encryption algorithm in the algorithm source code, using C language
zhihuan
- 古典加密算法,置换密码的C++的实现,利用置换密码来加密文本-Password replacement
a5
- A5算法是一种序列密码,它是欧洲GSM标准中规定的加密算法,用于数字蜂窝移动电话的加密,加密从用户设备到基站之间的链路。A5算法包括很多种,主要为A5/1和A5/2。其中,A5/1为强加密算法,适用于欧洲地区;A5/2为弱加密算法,适用于欧洲以外的地区。-The GSM encryption algorithm, A5, is not much good. Its effective key length is at most five bytes and anyone with the
des
- 实现des加密,vs编程,是密码加密的一个主要内容。-Realize des encryption, vs programming
security-of-info
- 这是属于信息安全,密码学资料。有助于学习信息安全的新手尽快入门-This is a matter of information security, cryptography information. Information security will help the novice to learn as quickly as possible
RSA-kouling
- RSA 加密解密算法动态口令,这份资料有助于RSA初学者尽快入门-RSA encryption and decryption algorithms dynamic password, this information will help beginners as quickly as possible RSA
ALem-Haddush
- Data Encryption using MULTI-SCROLL CHAOTIC ATTRACTORS & A SHARED IMAGE AS A KEY
aes-decryption
- aes加解密及五种工作模式源代码加解密及五种工作模式源代码-aes encryption source code mode and five and five modes of encryption source code
kcpDES
- DES算法的加密解密,借用别人的代码,自己编写的小界面。可以加密八位以下的字符,解密后输出为十六进制,并且可以正确解密。希望对大家有用-DES algorithm for encryption and decryption, to borrow someone else' s code, I have written a small interface. The following eight characters can be encrypted, decrypted output to
