Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - v c
Search - v c - List
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives : - To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output - To share a file into shadows : cryptest's
Date : 2008-10-13 Size : 379.94kb User : Nikii

MD5 加 密的V i s u a l C + + S o u r c e C o d e .-MD5 V i s a u l C S o u r c e C o d e.
Date : 2008-10-13 Size : 105.65kb User : Raymond

加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives :- To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output- To share a file into shadows : cryptest's
Date : 2025-12-30 Size : 380kb User : Nikii

MD5 加 密的V i s u a l C + + S o u r c e C o d e .-MD5 V i s a u l C S o u r c e C o d e.
Date : 2025-12-30 Size : 105kb User : Raymond

在原来基础上新添加了对ST、V、I、C卡的处理,并给出了怎样使一台机顶盒支持 多种智能卡的伪代码!-In the original based on the newly added to ST, V, I, C card processing, and gives the how to make a set-top box supports a wide range of smart cards Pseudocode!
Date : 2025-12-30 Size : 34kb User : 童辉

dvb ca 移植接口代码及文档说明。有对ST、V、I、C卡的处理说明,并给出了怎样使一台机顶盒支持多种智能卡的伪代码! -dvb ca transplant interface code and documentation. There ST, V, I, C cards to deal with that, and given how to make a set-top box supports a wide range of smart cards Pseudocode!
Date : 2025-12-30 Size : 33kb User : xiaoli

DL : 0
用v c 编写的,可加密文本文档,可自行解密功能,设有使用密码。-By vc prepared text document can be encrypted can be decrypted on its own functions, with the use of a password.
Date : 2025-12-30 Size : 10kb User : 易天行

VMProtect 简介 VMProtect 是新一代的软件保护系统,不像其它常见的保护系统,VMProtect 可以修改应用程序的源代码。VMProtect 将原文件的部分代码转换为在虚拟机中运行的字节码。您可以将虚拟机想像成带有不同于 Intel 8086 处理器指令系统的虚拟处理器;例如,虚拟机没有比较两个操作数的指令,也没有条件跳转和无条件跳转等。 支持的编译器: Delphi Borland C Builder Visual C/C++ Visual Basic (native) Virtual Pascal 支持的文件类型(32 位和 64 位): EXE DLL BPL OCX SYS 支持的操作系统: Windows 95/98 Windows ME Windows NT Windows 2000 Windows XP Windows 2003 Windows Vista-标准类 TObject = class constructor Create procedure Free end TPersistent = class(TObject) procedure Assign(Source: TPersistent) end TStrings = class(TPersistent) function Add(S: String): Integer procedure Append(S: String) procedure AddStrings(Strings: TStrings) procedure Clear procedure Delete(Index: Integer) function IndexOf(const S: String): Integer procedure Insert(Index: Integer S: String) procedure LoadFromFile(FileName: String) procedure SaveToFile(FileName: String) property Count: Integer read property Text: String read write property CommaText: String read write property Strings[Index: Integer]: String read write property Objects[Index: Integer]: TObject read write end TDuplicates = (dupIgnore, dupAccept, dupError) TNotifyEvent = procedure(Sender: TObject) TStringList = class(TStrings) function Find(S: String var Index: Integer): Boolean procedure Sort property Duplicates:
Date : 2025-12-30 Size : 16kb User : cxzhack

DL : 0
VMProtect 简介 VMProtect 是新一代的软件保护系统,不像其它常见的保护系统,VMProtect 可以修改应用程序的源代码。VMProtect 将原文件的部分代码转换为在虚拟机中运行的字节码。您可以将虚拟机想像成带有不同于 Intel 8086 处理器指令系统的虚拟处理器;例如,虚拟机没有比较两个操作数的指令,也没有条件跳转和无条件跳转等。 支持的编译器: Delphi Borland C Builder Visual C/C++ Visual Basic (native) Virtual Pascal 支持的文件类型(32 位和 64 位): EXE DLL BPL OCX SYS 支持的操作系统: Windows 95/98 Windows ME Windows NT Windows 2000 Windows XP Windows 2003 Windows Vista -标准类 TObject = class constructor Create procedure Free end TPersistent = class(TObject) procedure Assign(Source: TPersistent) end TStrings = class(TPersistent) function Add(S: String): Integer procedure Append(S: String) procedure AddStrings(Strings: TStrings) procedure Clear procedure Delete(Index: Integer) function IndexOf(const S: String): Integer procedure Insert(Index: Integer S: String) procedure LoadFromFile(FileName: String) procedure SaveToFile(FileName: String) property Count: Integer read property Text: String read write property CommaText: String read write property Strings[Index: Integer]: String read write property Objects[Index: Integer]: TObject read write end TDuplicates = (dupIgnore, dupAccept, dupError) TNotifyEvent = procedure(Sender: TObject) TStringList = class(TStrings) function Find(S: String var Index: Integer): Boolean procedure Sort property Duplicates:
Date : 2025-12-30 Size : 4kb User : cxzhack

tradittional crypto in C
Date : 2025-12-30 Size : 36kb User : temndul

DL : 0
rfid_Crc.c,v 1.1 2006/09/25 22:08:15 tpresco-rfid_Crc.c,v 1.1 2006/09/25 22:08:15 tprescott
Date : 2025-12-30 Size : 1kb User : 徐勇慧

DL : 0
Julius Caesar曾经使用过一种很简单的密码。对于明文中的每个字符,将它用它字母表中后5位对应的字符来代替,这样就得到了密文。比如字符A用F来代替。如下是密文和明文中字符的对应关系。 密文 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 明文 V W X Y Z A B C D E F G H I J K L M N O P Q R S T U 你的任务是对给定的密文进行解密得到明文。 你需要注意的是,密文中出现的字母都是大写字母。密文中也包括非字母的字符,对这些字符不用进行解码。 -Julius Caesar had used a very simple passwords. To express each of the characters in its alphabet with its corresponding character after the 5 to replace, so get the ciphertext. A character such as using F instead. Here are the characters in the ciphertext and plaintext correspondence. Ciphertext ABCDEFGHIJKLMNOPQRSTU VWXYZ expressly VWXYZABCDEFGHIJKLMNOP QRSTU Your task is given to decrypt the ciphertext be clear. You need to note that the ciphertext letter appears in all capital letters. Ciphertext also includes non-alphabetic characters, these characters without decoding.
Date : 2025-12-30 Size : 1kb User : dvd

一个命令行下的MD5校验工具 ,用法:MD5AV [-c] [-f<FolderName>] [-h] [-n<FileName>] [-o<OutputFolder>] [-r] [-v] [-x<FolderName]-MD5ArchiveValidator (MD5AV) is a utility to confirm the accurate storage of files through MD5 Checksums. For each file in question, MD5AV computes the MD5 Checksum of the contents and stores the result in a summary file. MD5AV can then use the summary information to verify the content of each file hasn’t changed. Please note: as of this time, MD5AV will only check the first 4 GB of each file
Date : 2025-12-30 Size : 86kb User : 天诛

DL : 0
运用C的语言环境,对V码进行加密和解密的过程-Using C language environment, V codes process of encryption and decryption
Date : 2025-12-30 Size : 3kb User : 刘亮亮

DL : 0
利用C\C++实现RSA算法的加、解密运算。 具体包括: 1)利用扩展的Euclid计算 a mod n 的乘法逆元; 2)Miller-Rabin素性测试算法对一个给定的大数进行测试; 3)实现的运算,并计算; 4)利用Euler定理手工计算,并与3)计算的结果对比; 5)实现RSA算法。并对 I LOVE NANJING UNIVERSITY OF AERONAUTICS AND ASTRONAUTICS 加解密。说明:为了方便实现,分组可以小一点,比如两个字母一组。 字母及其数字编码 字母及其数字编码 空格 00 N 14 A 01 O 15 B 02 P 16 C 03 Q 17 D 04 R 18 E 05 S 19 F 06 T 20 G 07 U 21 H 08 V 22 I 09 W 23 J 10 X 24 K 11 Y 25 L 12 Z 26 M 13 -Use of C \ C++ implements the RSA algorithm encryption and decryption operations. These include: 1) using the extended Euclid calculate a mod n multiplicative inverse 2) Miller-Rabin primality testing algorithm for a given test large numbers 3) to achieve the operation, and the calculation 4) the use of Euler Theorem manual calculation, and compared with the results of the calculation 3) 5) implement the RSA algorithm. And I LOVE NANJING UNIVERSITY OF AERONAUTICS AND ASTRONAUTICS encryption and decryption. Description: In order to facilitate the achievement of the packet may be smaller, for example, a group of two letters. Alphabet letters and their digital encoding and digital encoding Spaces 00 N 14 A 01 O 15 B 02 P 16 C 03 Q 17 D 04 R 18 E 05 S 19 F 06 T 20 G 07 U 21 H 08 V 22 I 09 W 23 J 10 X 24 K 11 Y 25
Date : 2025-12-30 Size : 1kb User : 刘洋

DL : 0
置换密码算法的原理是不改变明文字符,只将字符在明文中的排列顺序改变,从而实现明文信息的加密。置换密码也叫换位密码。 试编程实现矩阵换位密码。它的加密方法是将明文中的字母按照给定的顺序安排在一个矩阵中,然后用根据密钥提供的顺序重新组合矩阵中的字母,形成密文。例如,明文为attack begins at five,密钥为cipher,将明文按照每行6个字母的形式排在矩阵中,如下形式: a t t a c k b e g i n s a t f i v e 根据密钥cipher中各字母在字母表中出现的先后顺序,给定一个置换: 根据上面的置换,将原有矩阵中的字母按照第1、4、5、3、2、6的顺序排列,则有下列形式: a a c t t k b i n g e s a i v f t e 从而得到密文:aacttkbingesaivfte 解密过程类推。 -The principle of permutation cipher algorithm is to change the order of characters in plaintext without changing the plaintext characters, so as to realize the encryption of plaintext information. Permutation cipher is also called transposition cipher. Programming to achieve matrix transposition password. Its encryption method is that the letters in the plaintext are arranged in a matrix according to a given order, and then the letters in the matrix are re assembled in the order provided by the key to form a ciphertext. For example, the plaintext is attack begins at five, the key is cipher, and the plaintext is placed in the matrix in the form of 6 letters per row, as follows: A, t, t, a, C, K B, e, G, I, N, s A, t, F, I, V, e According to the order in which the letters in the key cipher appear in the alphabet, a permutation is given: According to the above permutation, the letters in the original matrix are arranged in the order of first, fourth, fifth, 3, 2 and 6, and the follo
Date : 2025-12-30 Size : 1kb User : 1
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.