Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - Make
Search - Make - List
汇编内核的md5算法,应网友要求改进了两个部分: 1、采用nasm风格汇编,可以方便的移植到linux平台下。 2、修正了56个字节以上明文加密会出错的bug,对任意长的明文都能够加密 使用方法: 一种方法是使用原代码包中的make.bat,这需要安装nasm编译器;第二种就是直接将md5_x86.obj拷贝到你的工程下,直接使用。 -compilation of md5 kernel algorithm, a netizen called for improvements in two parts : one, using NASM style compilation, can easily migrate to the Linux platform. 2, amended 56-byte encryption will be more explicit error bug, right arbitrarily long expressly can use encryption methods : one method is to use the original code of make.bat, which requires the installation of NASM compiler; The second is directly md5_x86.obj copy of your works under the direct use.
Date : 2008-10-13 Size : 8.16kb User : qve

加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives : - To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output - To share a file into shadows : cryptest's
Date : 2008-10-13 Size : 379.94kb User : Nikii

一个使用ACTIVX做的DES算法控件,可以使你在INTERNEN传输自己密钥加密的数据-ACTIVX do use a DES algorithm Controls You can make their own INTERNEN transmission of data encryption keys
Date : 2008-10-13 Size : 746.85kb User : wanggang

加解密文件,也不太好用,大家多指点啊, 错误中求进步嘛-increase declassified document and not handy, everyone kind ah, mistakes make progress!
Date : 2008-10-13 Size : 2.57kb User : liuming

这个是一款不错的文件加密软件,能让你的隐私文件受到严密的保护.-this is a good document encryption software that can make your documents to be subject to stringent privacy protection.
Date : 2008-10-13 Size : 1.41mb User : 李兵

将信息隐藏到图像中。 AppWizard has created this MyImageWork application for you. This application not only demonstrates the basics of using the Microsoft Foundation classes but is also a starting point for writing your application. This file contains a summary of what you will find in each of the files that make up your MyImageWork application.
Date : 2008-10-13 Size : 57.96kb User : xzy

这是一本关于解密的书,解密是Hacker的必备技能之一,希望大家能够好好掌握.-This is a book of declassified declassify Hacker is one of the essential skills, and hope that we can make good use of them.
Date : 2008-10-13 Size : 56.06kb User : 王耀

汇编内核的md5算法.使用方法:一种方法是使用原代码包中的make.bat,这需要安装nasm编译器;第二种就是直接将md5_x86.obj拷贝到你的工程下,直接使用-compilation of md5 kernel algorithm. Use : One method is to use the original code of make.bat, which requires the installation of NASM compiler; The second is directly md5_x86.obj copy of your project, the direct use
Date : 2025-12-16 Size : 4kb User :

这是一本关于解密的书,解密是Hacker的必备技能之一,希望大家能够好好掌握.-This is a book of declassified declassify Hacker is one of the essential skills, and hope that we can make good use of them.
Date : 2025-12-16 Size : 56kb User : 王耀

汇编内核的md5算法,应网友要求改进了两个部分: 1、采用nasm风格汇编,可以方便的移植到linux平台下。 2、修正了56个字节以上明文加密会出错的bug,对任意长的明文都能够加密 使用方法: 一种方法是使用原代码包中的make.bat,这需要安装nasm编译器;第二种就是直接将md5_x86.obj拷贝到你的工程下,直接使用。 -compilation of md5 kernel algorithm, a netizen called for improvements in two parts : one, using NASM style compilation, can easily migrate to the Linux platform. 2, amended 56-byte encryption will be more explicit error bug, right arbitrarily long expressly can use encryption methods : one method is to use the original code of make.bat, which requires the installation of NASM compiler; The second is directly md5_x86.obj copy of your works under the direct use.
Date : 2025-12-16 Size : 8kb User : qve

加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives :- To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output- To share a file into shadows : cryptest's
Date : 2025-12-16 Size : 380kb User : Nikii

一个使用ACTIVX做的DES算法控件,可以使你在INTERNEN传输自己密钥加密的数据-ACTIVX do use a DES algorithm Controls You can make their own INTERNEN transmission of data encryption keys
Date : 2025-12-16 Size : 747kb User : wanggang

加解密文件,也不太好用,大家多指点啊, 错误中求进步嘛-increase declassified document and not handy, everyone kind ah, mistakes make progress!
Date : 2025-12-16 Size : 2kb User : liuming

作一定修改可以穿透还原设备,软件,用汇编以及QB描述的-make certain changes can penetrate reduction equipment, software, the compilation and description of the QB
Date : 2025-12-16 Size : 3kb User : 21545

这个是一款不错的文件加密软件,能让你的隐私文件受到严密的保护.-this is a good document encryption software that can make your documents to be subject to stringent privacy protection.
Date : 2025-12-16 Size : 1.41mb User : 李兵

DL : 0
一个用DES做的加/解密代码,可用于任何文件加/解密-Make use of a DES encryption/decryption code, can be used for any file encryption/decryption
Date : 2025-12-16 Size : 1.34mb User : 李扬

DL : 0
用C++做的DES算法,内容较长,大家要耐心看懂代码-With C++ Make the DES algorithm, the content is longer, we must be patient to read the code
Date : 2025-12-16 Size : 162kb User : 陈勇辉 

DL : 0
之前看書參考試著自己寫 但沒成功 請網上較強的大哥試著修改一下 謝啦-Before reading a book reference but did not try to write their own successful online strong big brother, please try to make some corrections谢啦
Date : 2025-12-16 Size : 529kb User : a9507066

DL : 0
% 这是参照 University of California 提供的 MPEG 源代码的基础上编制的。 %用分块方法(8x8的块)对图象做zigzag变换, %效率极高,程序简洁,属信息隐藏中常用的方法之一。 %作者:辽宁大学 信息学院 范铁生 %email:fts0@163.com- This is a reference to University of California to provide the MPEG source code based on the establishment. Of sub-block method (8x8 block) to make zigzag transform images, high efficiency and simple procedure, which is commonly used in information hiding methods. Author: Liaoning University School of Informatics Fan Tiesheng email: fts0@163.com
Date : 2025-12-16 Size : 1kb User : gao

% 这是参照 University of California 提供的 MPEG 源代码的基础上编制的。 %用分块方法(8x8的块)对图象做zigzag变换, %效率极高,程序简洁,属信息隐藏中常用的方法之一。 %作者:辽宁大学 信息学院 范铁生 %email:fts0@163.com- This is a reference to University of California to provide the MPEG source code based on the establishment. Of sub-block method (8x8 block) to make zigzag transform images, high efficiency and simple procedure, which is commonly used in information hiding methods. Author: Liaoning University School of Informatics Fan Tiesheng email: fts0@163.com
Date : 2025-12-16 Size : 1kb User : gao
« 12 3 4 5 6 7 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.