Welcome![Sign In][Sign Up]
Location:
Search - 3 DES

Search list

[BooksAddison.Wesley.Professional.Designing.Web.Services

Description: Java开发Web Services的英文书-Java Web Services Development English books
Platform: | Size: 2576384 | Author: 彬彬 | Hits:

[SCMsource_liu

Description: 1.Delphi_WDM_USB测试源程序 2.stc单片机eeprom的实用操作(读写)源代码, 演示了eeprom内用户数据的动态分配地址方法,通过51rc及54rd+的实际测试 3.Easy 51Pro串行编程器源程序 4.des单片机算法源程序 5.ds18b20 c51源代码 6.Tasking C51 PWM 测试程序-1.Delphi_WDM_USB testing source 2.stc the SCM eeprom Practical operation (reading and writing) source code, a demonstration eeprom user data within the dynamic address allocation method 51 through the mail and 54rd of the actual test 3.Easy 51Pro serial device programming source 4.des SCM 5.ds18b20 source decoder algorithm source code 6.Tasking C51 PWM test procedures
Platform: | Size: 1275904 | Author: 何君 | Hits:

[Crack Hackac_source

Description: 加密算法代码文档,包括DES,LOKI91,IDEA,GOST,BLOWFISH,3-WAY,RC5,A5,SEAL-encryption algorithm code files, including DES, LOKI91, IDEA, GOST, BLOWFISH 3 items of article number-WAY, RC5, A5, SEAL
Platform: | Size: 62464 | Author: yn | Hits:

[CA authDES_C_keil

Description: 1,这是比较流行的DES算法代码. 2,特别是在通讯方面比较常用. 3,此代码可以在KEIL C环境下使用.-1, which is more popular in the DES algorithm code. 2, particularly in the more commonly used communications. 3. this code can KEIL C environment.
Platform: | Size: 14336 | Author: jeney | Hits:

[Crack HackC51encrypt

Description: 3个C语言算法源代码:CRC校验、DES的单片机加密算法代码,好用-three C language source code algorithm : CRC, the DES encryption algorithm MCU code handy
Platform: | Size: 14336 | Author: 杨峰林 | Hits:

[Crack Hackjiamijiemicodesource

Description: 计算机信息的保密显得越来越重要。数据保密变换,或密码技术,是对计算机信息进行保护的最实用和最可靠的方法。现阶段计算机硬盘以及其他大容量存储介质代替了纸张成为信息存储的主要方式,随之带来的信息安全问题也日渐突出,电子文档的信息安全成为一个至关重要的问题.电子文档的安全问题发生在两个场合:动态的传输途中、静态的存储形式.对于电子文档的传输安全,可以通过数据加密技术先加密再传输、保证电子文档的合法性和完整性 要完成的工作: 1. 对网络安全的基本概念和基本原理有一个了解。 2. 对各种加密与解密的算法做深入的理解。 3. 选择合适的算法编写程序。 4. 调试程序。 这个是源代码的打包哦! -the confidentiality of computer information are becoming increasingly important. Transform data confidentiality, or password technology, the computer information for the protection of the most practical and most reliable method. This stage of computer hard disks and other large-capacity storage medium instead of paper as the main information storage, the attendant's information security issues have become increasingly prominent, electronic document information security has become a critical issue. Electronic document security problem occurred in the two occasions : Transmission dynamics of the way, the storage form of static. for electronic document transmission security, through data encryption technology first re-transmission encryption to ensure the legality of electronic documents
Platform: | Size: 1341440 | Author: 吕文奎 | Hits:

[Crack HackAIcodesystem

Description: 1、对于凯撒密文,实现了:1种盲目式搜索,4种启发式搜索,以及利用密钥实现的凯撒加密系统。 2、对于代入法密文,实现了:2种启发式搜索,1种利用密钥的代入法加密系统以及随机生成密钥的代入法加密系统。 3、字典工具,实现了对词库的增加,删除,检查等一系列的操作。 4、7种其他较为经典的加密方法的加密解密工具。包括:DES、Vigenere、IDEA、Keyword、LFSR、Playfair以及RC4等。 -1, Caesar ciphertext, realized : a blind search species, four species of heuristic search, and the use of the keys for encryption system Caesar. 2, substituting it into law ciphertext, realized : two kinds of heuristic search, a key species used in lieu of law into the system and random encryption key generation to generation method of encryption systems. 3, dictionary tools, for the achievement of the Thesaurus of addition, deletion, and examined a series of operations. 4,7 kinds of other more classic methods of encryption tools for encryption and decryption. Including : DES, Vigenere, IDEA, Keyword, LFSR, Playfair and RC4, and so on.
Platform: | Size: 10400768 | Author: 陈守勇 | Hits:

[BooksC++DESIGN1

Description: 很好的C书籍 ,虽然是英文的,不过立志学好C的同胞们来说,就要克服这些困难.-good C books, although the English, but determined to learn C compatriots, we must overcome these difficulties.
Platform: | Size: 397312 | Author: hongfu | Hits:

[OtherCRYPTO

Description: The Microsoft® Cryptographic Application Programming Interface (CryptoAPI) provides services that enable application developers to add authentication, encoding, and encryption to their Microsoft Win32® -based applications. Application developers can use the functions in the CryptoAPI without knowing anything about the underlying implementation, in much the same way as they can use a graphics library without knowing anything about the particular graphics hardware configuration.-The Microsoft® Cryptographic Application Programming Interface (CryptoAPI) provides services that enable application developers to add authentication, encoding, and encryption to their Microsoft Win32®-based applications. Application developers can use the functions in the CryptoAPI without knowing anything about the underlying implementation, in much the same way as they can use a graphics library without knowing anything about the particular graphics hardware configuration.
Platform: | Size: 1311744 | Author: zy | Hits:

[Crack Hack220061019175353

Description: DES加密解密,支持3重加密解密,下载就可以使用,封装好的类-DES encryption and decryption support the 3 re-encryption and decryption, download you can use, packaged good category
Platform: | Size: 35840 | Author: | Hits:

[Education soft systemBooks_Manager-V1.4

Description: 使用说明: 1.软件名称: 图书管理系统Books_Manager V1.4 2.本程序系用java(jbuilder9,jdk1.4,手工jdk1.5)所开发,目前为v1.4版,因学习繁忙仅实现了图书管理、系统信息、用户手册、加密解密等功能,其他有待补充。 3.对以前版本已有功能进行了改进,实现了DES加密解密功能。 4.解压:“图书管理系统Books_Manager V1.4.rar”后,运行其中的exe文件即可运行。---Author:zhg zhg工作室 2008.1 E-mail:wudazhg@163.com 版权所有,侵权必究 All Rights Reserved-Use: 1. Software Name: Library Management System Books_Manager V1.42. This procedure line with java (jbuilder9, jdk1.4, hand-jdk1.5) the development, the current v1.4 version, due to busy study only achieved a book management, system information, user manuals, such as encryption and decryption functions, the other to be added. 3. Of the previous version has been improved functionality achieved DES encryption and decryption functions. 4. Decompress: library management system Books_Manager V1.4.rar , run the exe file which can be run.--- Author: zhg zhg Studio 2008.1 E-mail: wudazhg@163.com All rights reserved All Rights Reserved
Platform: | Size: 638976 | Author: wudazhg | Hits:

[TCP/IP stacktcp

Description: 1)以命令行形式运行:SendTCP source_IP source_port dest_ip dest_port 其中,SendTCP为程序名,source_IP为源端IP地址,source_port为源端口,dest_ip 为目的IP地址,dest_port为目的端口 2)其他的TCP头部参数请自行设定。 3)数据字段为“This is my homework of network ,I am happy!”. 4)成功发送后在屏幕上输出“Send OK”。 -1) to form the command line run: SendTCP source_IP source_port dest_ip dest_port which, SendTCP for the program name, source_IP client IP address as the source, source_port for the source port, dest_ip for the purpose of IP address, dest_port for the purpose of port 2) other parameters of TCP head your own settings. 3) data fields for the This is my homework of network, I am happy! .4) Successfully sent the output on the screen after the Send OK .
Platform: | Size: 2048 | Author: 肖叶 | Hits:

[Crack Hack20081171440801

Description: 程序结构清晰,可读性强,能实现3-DES算法的加解密-Clear program structure, readability, and can realize 3-DES encryption and decryption algorithm
Platform: | Size: 5120 | Author: uuu | Hits:

[Other2006Software-designers-test

Description: 软件设计师--中程 计算机软件专业考试 真题 90-2006 真题 试题+答案 合集
Platform: | Size: 3791872 | Author: | Hits:

[Crack Hack20081171440801

Description: 能实现3-DES算法的加解密,希望对大家有所帮助.-To achieve 3-DES encryption and decryption algorithms, and they hope to be helpful to everyone.
Platform: | Size: 8192 | Author: vivian | Hits:

[Crack Hackd3des

Description: C语言实现的3重DES加密的程序,包含主程序和头文件-C Language Implementation of the 3 re-DES encryption process, including the main program and header files
Platform: | Size: 6144 | Author: yy | Hits:

[ICQ-IM-ChatClient-Server-based-Security-Comunication-Tool

Description: 自己用Java编的Client-Server聊天程序,结合了网络通信、数据安全、多线程的知识 1.使用RSA算法完成DES密钥的分配; 2.使用MD5结合RSA算法完成对消息的签名; 3.对原有消息及签名提供机密性保护(用DES算法加密); 4.能够解密并验证签名的合法性 -Their use of Java made the Client-Server chat program, a combination of network communications, data security, knowledge of multi-threaded one. RSA algorithm using the completion of the distribution of DES keys 2. RSA algorithm combines the use of MD5 message to complete the signature 3. The original message and signature to provide confidentiality protection (with DES encryption algorithm) 4. Able to decrypt and verify the legitimacy of the signature
Platform: | Size: 8192 | Author: Shadow | Hits:

[VHDL-FPGA-Verilog3des_vhdl

Description: 3重DES(3DES)加密算法的问答及其VHDL实现。-3 re-DES (3DES) encryption algorithm and the Q
Platform: | Size: 140288 | Author: 张开文 | Hits:

[OtherCNT1.3

Description: 完美世界外挂,可以自动打怪,拾物,加血等多功能软件-Plug-perfect world, you can automatically打怪, Found objects, plus multi-purpose software, such as blood
Platform: | Size: 1810432 | Author: 枫逸 | Hits:

[Crack Hack3DES

Description: 3DES加密算法~~~~~~~ 密码学课程设计-3DES encryption algorithm ~~~~~~~ Cryptography Course Design
Platform: | Size: 1942528 | Author: jill | Hits:
« 1 2 34 5 6 7 8 9 10 »

CodeBus www.codebus.net