搜索资源列表
AESsim
- AES alogrithm security encryption
Md5
- md5 code in c.its an alogrithm which is used to encrpypt the d ata
antnet
- tcl code for antnet alogrithm
BlowfishDemo
- simulate Blowfish alogrithm
fips46-3
- data encryption standard alogrithm, explanation
process-time-based-alogrithm
- CPU 进程基于时间片的调度算法,CPU分时调动进程-time slice based cpu process management
aes
- VC实现的AES加密算法rijndaeo算法,简单易懂初学者参考-a simple code for AES rijndaeo alogrithm of C code
Fill
- 计算机图形学三种种子填充算法,实现了有序边表填充,边标志填充,种子填充三种算法。-three fill alogrithm
cpuminer-master
- 莱特币挖掘机源码,主要有scrypt算法-LTC miner source code,including scrypt alogrithm
Skein_Reference_Implementation
- Skein参考算法的实现,尽管Skein没有通过最后一轮竞选,但它本身仍是一种优秀的散列加密算法-Skein reference alogrithm, although Skein didn t pass the last round competition, it s a excellent alogrithm for hash encryption
BLAKE_Optimized_32bit
- BLAKE优化的32bit的算法的实现,尽管Skein没有通过最后一轮竞选,但它本身仍是一种优秀的散列加密算法-BLAKE optimized 32bit alogrithm, although Skein didn t pass the last round competition, it s a excellent alogrithm for hash encryption
BLAKE_Reference_Implementation
- BLAKE的参考算法的实现,尽管Skein没有通过最后一轮竞选,但它本身仍是一种优秀的散列加密算法-BLAKE reference alogrithm, although Skein didn t pass the last round competition, it s a excellent alogrithm for hash encryption
JH_Optimized_64-bit
- JH优化的64bit的算法的实现,尽管Skein没有通过最后一轮竞选,但它本身仍是一种优秀的散列加密算法-JH optimized 64bit alogrithm, although Skein didn t pass the last round competition, it s a excellent alogrithm for hash encryption
JH_Reference-Implementation
- JH的参考算法的实现,尽管Skein没有通过最后一轮竞选,但它本身仍是一种优秀的散列加密算法-JH reference alogrithm, although Skein didn t pass the last round competition, it s a excellent alogrithm for hash encryption
Groestl_Optimized_32bit
- Groestl的优化的32bit的实现,尽管Skein没有通过最后一轮竞选,但它本身仍是一种优秀的散列加密算法-Groestl optimized 32bit alogrithm, although Skein didn t pass the last round competition, it s a excellent alogrithm for hash encryption
Groestl_Reference_Implementation
- Groestl的优化的32bit的算法的实现,尽管Skein没有通过最后一轮竞选,但它本身仍是一种优秀的散列加密算法-Skein reference alogrithm, although Skein didn t pass the last round competition, it s a excellent alogrithm for hash encryption
Chaotic-image-encryption
- Encrypt and decrypt image using chaotic alogrithm
