搜索资源列表
blowfish
- 一个16为的blowfish的加密算法的源码
AT88SC0104_at88sc0104c_program_reader
- AT88SC0104(at88sc,at88sc0104c)烧录器软件下载,压缩包里面附带使用说明书 AT88SC0104C 1-Kbit 用户存储器, 带身份认证和加密 AT88SC0204C 2-Kbit 用户存储器, 带身份认证和加密 AT88SC0404C 4-Kbit 用户存储器, 带身份认证和加密 AT88SC0808C 8-Kbit 用户存储器, 带身份认证和加密 AT88SC1616C 16-Kbit 用户存储器, 带身份认证和加密
DESProcess
- DESProcess FILE *mfp,*cfp int ttch=0,xorRes,ttbitdiff=0 char mch,cch float bdiff=0 if((mfp=fopen(mfile,\"r\"))==NULL) {cout<<\"Cannot open the file to compare\"<<endl } if((cfp=fopen(cfile,\"r\"))==NULL) {cou
basMD5
- The code in basMD5.bas contains an implementation of the MD5 algorithm in VB6/VBA (zipped 6 kB). (VBA users should delete the first line with Attribute VB_Name in it.) This code is relatively slow. VB is not the best language to implement this algori
RSAToolV2.14
- 此为RSA可视化完整程序,功能齐全,可对文字、2、8、16进制进行加解密过程,且运算过程比较迅速。对于RSA的学习与研究有帮助。 -This is the complete RSA visualization process, functional and can text, 2,8,16 hex encryption and decryption process, and the operation process is relatively rapid. RSA study and rese
gerki
- des加密解密 算法的应用 功能:实现des加密过程中从56位的K密钥产生16个48位Ki子密钥-des encryption and decryption algorithms application functions: des encryption from the 56 K-16 48-bit key generation sub-key Ki
crc
- Code to find CRC 16 of a sequence
AES_algorithm
- AES是一种可用来保护电子数据的新型加密算法。特别是,AES是可以使用128、192和256位密钥的迭代式对称密钥块密码,并且可以对128位(16个字节)的数据块进行加密和解密。-AES is a new encryption algorithm to protect one of the available electronic data. In particular, AES may be used for 128, 192, and 256-bit key iterative symmet
DES
- 实现了DES加密16轮迭代中的一轮 实现了DES加密16轮迭代中的一轮-Achieve the DES encryption function 16
MD5
- MD5算法:MD5以512位分组来处理输入的信息,且每一分组又被划分为16个32位子分组,经过了一系列的处理后,算法的输出由四个32位分组组成,将这四个32位分组级联后将生成一个128位散列值-The MD5 algorithm: MD5 with 512 bit block to process input information, and each group was divided into 16 groups of 32 seats, after a series of processi
Crc16.py
- CRC 16 bits em python
MD5
- MD5加密算法,得到32位的16进制的密文-MD5 encryption algorithm, the 32 bit of the 16 Decimal
BLAKE2-master
- BLAKE2 are cryptographic hash functions based on Dan Bernstein s Cha stream cipher, but a permuted copy of the input block, XORed with some round constants, is added before each Cha round. Like SHA-2, there are two variants differing in the word size
