Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - encryption
Search - encryption - List
加密与解密的电子版文档,详细介绍了软件破解的原理及常用工具的使用,并附有详细的例子说明-encryption and decryption of electronic version of the document, detailing the software decipher principle and the use of commonly used tools, together with detailed examples
Date : 2025-12-23 Size : 4.43mb User : 王浩强

DL : 0
这是一本关于加密算法的电子书籍,其中介绍了多种实际应用的加密算法。-This is an encryption algorithm on the electronic book, which presents a wide range of practical applications of encryption algorithm.
Date : 2025-12-23 Size : 239kb User : 高志强

DL : 0
这是一本关于加密算法的电子书籍,其中介绍了多种实际应用的加密算法。-This is an encryption algorithm on the electronic book, which presents a wide range of practical applications of encryption algorithm.
Date : 2025-12-23 Size : 139kb User : 高志强

软件加密技术 软件加密技术,软件加密技术书籍- Software encryption technology software encryption technology, software encryption technology books
Date : 2025-12-23 Size : 1.33mb User : 他们更

《加密解密技术内幕》全面讲解了有关加密解密方面的知识,对于在此方面有兴趣的初学者或是有一定基础的读者很有帮助。-"encryption and decryption technology insider," a comprehensive account of the encryption and decryption of knowledge, in this context are interested beginners or a basis of readers helpful.
Date : 2025-12-23 Size : 1.33mb User : 王松

RSA 加密、解密算法流程图,以及源代码解析,让你快速熟悉RSA算法。-RSA encryption, decryption algorithm flowchart, and source code analysis, which allows rapid familiar with the RSA algorithm.
Date : 2025-12-23 Size : 696kb User :

DL : 0
虚拟专用网的创建与实现:本书系统介绍了虚拟专用网的概念、起源、配置、实现和维护,还对虚拟专用网体系结构、加密工具、有关限制、防火墙结构等内容进行了探讨,并提供了大量实例。本书是网络、MIS管理员必备的参考书。 -Virtual Private Network creation and realization : this book system introduced Virtual Private Network concept, the origin, distribution, implementation and maintenance, also Virtual Private Network Architecture, encryption tools, the restrictions, firewall structure on the content and provide a lot of examples. The book is network and MIS managers indispensable reference book.
Date : 2025-12-23 Size : 17.84mb User : maha

《软件加密 技术内幕》 非常好的软件加密教程。-"software encryption technology insider" very good encryption software tutorial.
Date : 2025-12-23 Size : 1.33mb User : ufosky

清华大学出版的软件加密与解密的实战攻略,以实例的方式讲解了常见的软件加密与解密的相关技术。-Tsinghua University publishing software encryption and decryption of the actual Raiders to examples of the way on the common software encryption and decryption of the related technology.
Date : 2025-12-23 Size : 11.33mb User : arone

DL : 0
详细介绍了OPENSSL的各种指令用法,介绍了OPENSSL里面用到的加密算法,而且包含有大量实例-Described in detail the various commands OPENSSL usage, introduced OPENSSL inside the encryption algorithm used, and contains a large number of examples
Date : 2025-12-23 Size : 981kb User : 朱敏

DL : 0
DES encryption source, for chaining and block crypt
Date : 2025-12-23 Size : 10kb User : Phillip

加密解密软件可实现加密与解密。RSA解密加密软件-Encryption and decryption software encryption and decryption can be achieved. RSA decryption encryption software
Date : 2025-12-23 Size : 13kb User : 刘鹏

DL : 0
实现rc4的算法功能,具有强大的加密功能-Rc4 algorithm to achieve functionality with strong encryption
Date : 2025-12-23 Size : 23kb User : 杨捷

DL : 0
C++语言开发,能演示AES加密,解密,并含有AES讲解的Flash动画-C++ language development, can demonstrate AES encryption, decryption, and explain the Flash animation with AES
Date : 2025-12-23 Size : 83kb User : xiao jin

DL : 0
RSA加解密,大数函数实现。能够实现很多功能-RSA encryption and decryption, the function of large numbers to achieve. Many functions can be achieved
Date : 2025-12-23 Size : 8kb User : jinglei

DL : 0
《C++超大整数类以及RSA加密算法文件》-C++ large integers and the RSA encryption algorithm class file
Date : 2025-12-23 Size : 18kb User :

DL : 0
加密与解密学习资料,适合有一定基础的学习更快-Encryption and decryption learning material, suitable for a certain basis for learning faster
Date : 2025-12-23 Size : 44.94mb User : zoulei

DL : 0
简单加密的思想是: 将每个字母C加一序数K,式子 c=chr(Asc(c)+k), 例如序数k为5,这时 “A” “F”,“a” “f”,“B” “G”… 当加序数后的字母超过“Z”或“z”则 c=hr(Asc(c)+k -26)。 解密为加密的逆过程。 -The idea is simple encryption K,: Each letter C plus a sequence number to the formula c = CHR (Asc (c)+k) is, for example, the sequence number k 5 In this case " A"  F " ," a "  f " ," B "  " G " ... more than when add sequence number after the letter" Z " or" Z " is c = hr (ASC+k-26 (c)). Decrypt an encrypted inverse process.
Date : 2025-12-23 Size : 2kb User : 张亮

I am trying to implement IDEA algorithm in C#, just to learn how it works. I have taken a 128 bit binary key and generated the 52 encryption keys.
Date : 2025-12-23 Size : 373kb User : Tanusree Saha

DL : 0
chaotic image encryption and decryption.
Date : 2025-12-23 Size : 2.05mb User : chandrapal singh
« 12 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.