Description: This a new algorithm in which we encrypt on the basis of position of the character. Algorithm 1 for key generation and Algorithm 2 is for encryption Algorithm A1 Step1: Let the key be ‘k’. Step2: Multiply the index numbe Platform: |
Size: 1024 |
Author:Aman Virmani |
Hits:
Description: MD5 algorithm used in network security, knowledge of cryptography, encryption and decryption algorithms, wrote it myself, for reference only Platform: |
Size: 1024 |
Author:马璐璐 |
Hits:
Description: Webmaster will activate your member account after checking your files. If you do not want to upload source code Platform: |
Size: 653312 |
Author:pahm thuong |
Hits:
Description: You need to configure before running the program OpenSSL development environment (SHA-1 algorithm uses OpenSSL development package implementation), source code for a digital signature DSS (Digital Signature Standard Amer Platform: |
Size: 12158976 |
Author:郭政伟 |
Hits:
Description: Using java encryption algorithm to achieve the national SM3, but the inside of the jar package requires its own download complete Platform: |
Size: 4096 |
Author:余杨笛 |
Hits:
Description: Complete the Dijkstra algorithm on eclipse, code by way of example illustrates the principle of Dijkstra algorithm directly. Platform: |
Size: 8192 |
Author:兰博 |
Hits: