Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - encryption
Search - encryption - List
INTERNET网络高级编程的包括邮件加密、MAPI、ISAPI、ACTIVEX、FTP等等。-INTERNET senior network programming including mail encryption, MAPI, ISAPI, ACTIVEX, FTP and so on.
Date : 2025-12-23 Size : 40.32mb User : 韦功成

制作加密文本文件程序1.原理从源文本文件中按顺序读出每一个字符,然后把读出的字符转换为相应的ASCII码,将此ASCII码加上整数密钥Key,最后把所得结果再转回相应的字符并同时把它写入到另外一个文件中,这就是加密过程。解密码过程与加密过程刚好是相反的操作。2.界面设计新建一个工程,在Form1中添加一个Label,一个Edit和两个Button,程序的界面设置与布局如图所示。图一 界面布局-encryption produced a text file procedures. Principle from the source text file sequentially read out each character and then read out the characters into the corresponding ASCII, ASCII with this integer key Key, the final results were then put back to the corresponding character and turn it into another one of the documents This is the encryption process. Xie password and encryption process is exactly the opposite of operation. 2. Interface design of a new project, Form1 add a Label, a Edit Button and the two procedures are set up and interface layout shown in the figure. A layout map interface
Date : 2025-12-23 Size : 1kb User : 万宏兴

一个RSA源代码,对各种字符串进行加密解密,包含汉字,数字-a source of all kinds of strings encryption and decryption, including Chinese characters, figures
Date : 2025-12-23 Size : 2.3mb User :

此为本书的配套光盘.本书不但由浅入深地讲解了软件保护技术,而且还精选并剖析了一些破解实例,并从一定的角度透视解密者的心态,在多处对照了软件保护与破解的思维方法。主要内容有:软件加密的发展历史、误区、方法,以及与特定语言相关的软件加密技术;破解技术剖析,以及常见的软件加密薄弱环节;PE技术、实战外壳加密与反脱壳技术(附大量示例源码),并提供了作者自己编写的小工具(加壳工具PEMaker等);调试技术与反调试技术(附大量示例源码);软件加密技巧与整体方案设计;加密锁分类及其使用技巧(智能卡加密锁)。-this be supporting the CD. The book not only elementary to explain the software protection technology, but also selected and analyzed some scary examples, and from a certain angle lens decryption of mentality in various control software protection and crack way of thinking. The main contents are : encryption software in the history of misunderstanding, methods, and with the specific language-related software encryption technology; Crack technical analysis, and common weak link encryption software; PE technology, real shell encryption technology and anti-sabot (A large sample source), and mention the author himself for the preparation of small tools (PEMaker shell tools, etc.); Debugging and anti-debugging techniques (A large sample source); software encryption techniques and overall progra
Date : 2025-12-23 Size : 13.14mb User : 陶立欣

DES加密算法C++实现,简单易懂。 绝对好用!-DES encryption algorithm C realization of simple and understandable. Absolutely handy!
Date : 2025-12-23 Size : 8kb User : 陈打开

本书详细介绍了在现有MFC应用程序中综合运用.NET框架的技术。全书共分11章,内容包括正则表达式、文件I/O和注册表、数据加密、XML和DOM、ADO .NET数据库、远程处理、事件日志等。为了让读者透彻理解如何运用.NET框架来扩展MFC程序,作者为每个知识点配备了演示程序并提供了实用的项目创建指导和大量案例程序。   本书适合于具有MFC编程知识的程序员作为参考书,尤其适合致力于在MFC应用程序中运用.NET基类库(BCL)的程序员。-the book described in detail the existing MFC application integrated application.NET framework technologies. The book is divided into 11 chapters, including regular expression, the paper I/O and the registry, data encryption, DOM XML and ADO.NET database, remote processing, such as the event log. To give readers a thorough understanding of how to use.NET framework to expand the MFC procedures, The author points for each equipped with the knowledge Demonstration Program and to provide practical guidance to the project to create a large number of cases and procedures. The book is suitable for MFC programmers programming knowledge as reference books, particularly suitable for application to the MFC application to the procedure.NET base class library (BCL) programmers.
Date : 2025-12-23 Size : 20.23mb User : xifeng

该程序是用C编写的RM码的编译码算法,用于仿真AWGN信道下的性能.-that the procedure was used to prepare the RM C code encryption algorithm for simulation AWGN channel performance.
Date : 2025-12-23 Size : 2kb User : zzq

该程序是用C语言编写的,用于实现CRC编译码.-that the procedure was used to prepare the C language, for the realization of CRC encryption.
Date : 2025-12-23 Size : 1kb User : zzq

这是一个加密算法,好用才能说好,所以大家试试吧!我觉得应该不错的!-This is an encryption algorithm, ease of use will be able to say, so everyone give it a try! I think we should be good!
Date : 2025-12-23 Size : 5kb User : 袁泉

加密程序源代码* A 变成 C,B 变成 D,a 变成 c,b 变成 d,Y 变成 A, * z 变成 b,以此类推。非字母字符不变。 -Encryption source code* A becomes C, B becomes D, a into c, b into d, Y into A,* z into b, and so on. Non-alphabetic characters remain unchanged.
Date : 2025-12-23 Size : 3kb User : hushubing

设计思路: 首先建立"原文.txt" "加密.txt"两个文件,在"原文.txt" 中输入要加密的字符300以内 从主函数注明的接口处可以再随意加入自己的加密函数, 全局变量abc[300]中存放这些字符,tt是这些字符的个数-Design ideas: First, to establish the original text. Txt encryption. Txt two documents, in the original. Txt Enter encryption to 300 characters or less marked from the main function of the interface can be arbitrarily adding their own encryption function, Global Variables abc [300] in the storage of these characters, tt is the number of these characters
Date : 2025-12-23 Size : 2kb User : wz

登陆界面加上加密解密文件,需要的用户可以-Landing interface coupled with encryption and decryption files, users can look at the necessary
Date : 2025-12-23 Size : 3.76mb User : 谢热

Tiny Encryption Algorithm for secure communication.
Date : 2025-12-23 Size : 25kb User : osmana

第一章到第五章的代码 本书通过100多个模块实例,详细地讲解了Verilog HDL程序设计语言,全书共分13章,内容涉及VerilogHDL语言基本概念、建模、同步设计、异步设计、功能验证等,实例包括各种加法器/计数器、乘法器/除法器、编码器/译码器、状态机、SPIMaster Controller、I2C Master controller、CAN ProtocolController、Memory模块、JPEG图像压缩模块、加密模块、ATA控制器、8位RISC-CPU等及各个实例模块相应的Testbench,所举实例具有很强的实用性和代表性,每个实例均给出了介绍、功能分析、程序代码和结果演示。-Chapter to Chapter V of the code in this book through more than 100 module instance, explain in detail the Verilog HDL programming language, the book is divided into 13 chapters, covering basic concepts VerilogHDL languages, modeling, synchronous design, asynchronous design, function authentication, etc. Examples include a variety of adder/counter, multiplier/divider, encoders/decoders, state machines, SPIMaster Controller, I2C Master controller, CAN ProtocolController, Memory modules, JPEG image compression module, encryption module, ATA controller, 8-bit RISC-CPU, etc. and the various instances of the corresponding module Testbench, The examples are highly practical and representation, each instance of it all gives the introduction, functional analysis, program code and results presentation.
Date : 2025-12-23 Size : 1.51mb User : xiao

本例通过C语言编程来实现AES的加密算法-C programming language to implement the AES encryption algorithm
Date : 2025-12-23 Size : 4kb User : 王威

提供MD5,SHA1,SHA256,SHA512等四种算法,加密字串的长度依次增大。 加密算法实现-Provides four algorithms MD5, SHA1, SHA256, SHA512, the encryption string of length increase sequentially. Encryption algorithm
Date : 2025-12-23 Size : 2kb User : kyle

数字图像处理,图像加密,混沌加密,基于Visual C-Digital image processing, image encryption, encryption, based on Visual C++,chaos.
Date : 2025-12-23 Size : 15kb User :

C# text Encryption Decryption Using AES advance encryption standard
Date : 2025-12-23 Size : 51kb User : mohsen

通过构造线性表,以对线性表的遍历插入提取删除元素等操作实现对文本串的加密-By constructing a linear form, based on the linear traversal table insertion extraction operations to remove elements to realize text string encryption
Date : 2025-12-23 Size : 5kb User : mingluchang

A variety of functions, such as character processing, shell, mouse, encryption, system
Date : 2025-12-23 Size : 353kb User : RPHM_605
« 12 3 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.