Welcome![Sign In][Sign Up]
Location:
Search - data encryption

Search list

[Crack Hack数据加密与数字签名系统

Description: RSA数据加密代码,用C编写,已压缩成RAR格式-RSA data encryption code, prepared by C, has been compressed into RAR format
Platform: | Size: 186368 | Author: | Hits:

[Crack HackVB.NET - Security - Encrypt and Decrypt Data

Description: Tutorial for Vb .Net for Encryption/Decryption of data
Platform: | Size: 93184 | Author: er | Hits:

[Crack Hackdesfunc

Description: 传输资料加解密,再以非对称式加密法中...Data Encryption Standard (DES) algorithm,Fast ...经Triple DES CBC 演算法对私密金钥做加密或解 密.使用者可从网站下载NCNUCA的凭证产生程式,自行产生-data transmission encryption and decryption, with non-symmetric encryption method ... Data Encryption Standard (DES) algorithm, Fast ... by the CBC Triple DES algorithm keys to privacy encryption or decryption. Users can be downloaded from the website NCNUCA programs have proof of their own produce.
Platform: | Size: 55296 | Author: 工期 | Hits:

[Software Engineering用新的高级加密标准(AES)保持你的数据安全

Description: AES(The Advanced Encryption Standard)是美国国家标准与技术研究所用于加密电子数据的规范。它被预期能成为人们公认的加密包括金融、电信和政府数字信息的方法。本文展示了AES的概貌并解析了它使用的算法。包括一个完整的C#实现和加密.NET数据的举例。在读完本文后你将能用AES加密、测试 基于AES的软件并能在你的系统中使用AES加密。  -AES (The Advanced Encryption Standard) is the National Institute of Standards and Technology for electronic data encryption standards. It was expected to be recognized by encryption including financial, telecommunications and government of digital information. This paper showed a picture of AES and its use of analytic algorithm. Including a complete C# and encryption.NET data, for example. After reading this you will be able to use AES encryption, AES-based testing and software in your system to use AES encryption.
Platform: | Size: 16384 | Author: | Hits:

[Crack Hackemacs-des

Description: DES( Data Encryption Standard)算法,于1977年得到美国政府的正式许可,是一种用56位密钥来加密64位数据的方法。DES算法以被应用于许多需要安全加密的场合。(如:UNIX的密码算法就是以DES算法为基础的)。-DES (Data Encryption Standard) algorithm, in 1977 the United States government's official permission, is a key 56 to 64-bit data encryption methods. DES algorithm to be applied to many needs security encryption occasions. (Eg : UNIX password algorithm is to DES algorithm-based).
Platform: | Size: 7168 | Author: yue | Hits:

[Crack HackaesCPP

Description: aes加密算法源代码AES是新的分组对称加密算法高级加密标准,源自比利时人Daemen和Rijmen共同设计的Rijndael算法.该算法充分运用了扩散和混淆技术并使用128/192/256这3种可变长度的密钥,对128bit分组数据进行加密.-Aes source code encryption algorithm AES is a symmetric encryption to the Advanced Encryption Standard algorithm. Belgians J.J.K.Daemen3 from a common design and Rijmen the Rijndael algorithm. the algorithm the proliferation and use of technology and the use of confusing 128/192/256 these three variable-length keys, a pair of 128 bit data encryption.
Platform: | Size: 3072 | Author: Qoo | Hits:

[Crack Hackdes

Description: 用VERILOG语言实现的数据加密标准代码,在QUARTUS5.1上仿真过-Using Verilog language code of the Data Encryption Standard, in the simulation had QUARTUS5.1
Platform: | Size: 1436672 | Author: zhang feng | Hits:

[CA authAESencryption

Description: 使用AES高级加密标准在cdma2000赢通信系统中实现空中接口部分的数据加密。-AES Advanced Encryption Standard using cdma2000 win in communication systems to achieve air-interface part of the data encryption.
Platform: | Size: 187392 | Author: fenger | Hits:

[Crack HackDES

Description: 用VC做的数据加密标准DES算法可视化实现.简单易懂,有密码学和C或C++基础即可理解-VC to do with the Data Encryption Standard DES algorithm visualization realize. Easy-to-read, password-and C or C++ Basis can be understood
Platform: | Size: 452608 | Author: dskgo | Hits:

[Windows DevelopIDEA

Description: IDEA (International Data Encryption Algorithm) Data Encryption Algorithm by famous Chinese scholars and password Jiaboshi experts James L. Massey in 1990 jointly proposed. As a block cipher designed a wonderful work, IDEA algorithm has strong anti-attack capability. Because encryption PGP (Pretty Good Privacy) software showed a very high security, and IDEA is the actual text of PGP encryption algorithm, the introduction of direct attacks to decrypt law, the text of PGP IDEA is the first line of defense. From the safety analysis of the IDEA-differential cryptanalysis capacity is far higher than double DES. Description: After the compiler plugin DLL files Add cf1127 \ features \ folder, double-click CalculationFactory.exe, click "formula / toolbox", and pressed buttons, "toolbox" tab, and can be read Plug-in tools to. The remaining nine folder contains different projects, all compiled into class library, which is calculated factory plug-in DLL files.-IDEA (International Data Encryption Algorithm) Data Encryption Algorithm by famous Chinese scholars and password Jiaboshi experts James L. Massey in 1990 jointly proposed. As a block cipher designed a wonderful work, IDEA algorithm has strong anti-attack capability. Because encryption PGP (Pretty Good Privacy) software showed a very high security, and IDEA is the actual text of PGP encryption algorithm, the introduction of direct attacks to decrypt law, the text of PGP IDEA is the first line of defense. From the safety analysis of the IDEA-differential cryptanalysis capacity is far higher than double DES. Description: After the compiler plugin DLL files Add cf1127 \ features \ folder, double-click CalculationFactory.exe, click "formula/toolbox", and pressed buttons, "toolbox" tab, and can be read Plug-in tools to. The remaining nine folder contains different projects, all compiled into class library, which is calculated factory plug-in DLL files.
Platform: | Size: 87040 | Author: huli | Hits:

[Crack HackDES

Description: DES(Data Encryption Standard) 加密系统的 C 语言源代码-DES (Data Encryption Standard) encryption system of the C language source code
Platform: | Size: 8192 | Author: leiuchan | Hits:

[Special Effectscode

Description: 基于LSB的图像中数据加密隐藏算法程序 图像的组成无非是一些字符串或者一些字节组成的字符串,然而,每一个字节数据位的重要度并不是一样的,两个相邻字节往往只有低位是不一样的。例如:00100110和00100111代表了两个不同渐变度的红色,但是就人眼是分辨不出来的。最低有效位LSB算法,就是利用这一点,达到图像压缩,或者数字水印的功能。 -LSB of the image-based data encryption to hide the image composition algorithm procedure is nothing more than some number of bytes or string composed of string, however, one byte for each data bit is not an important degree of the same, and two adjacent words section, usually only low level is not the same. For example: 00100110 and 00100111 represent the gradient of two different degrees of red, but on the human eye is not out to tell. Least significant bit LSB algorithm, is to take advantage of this point, to achieve image compression, or digital watermark feature.
Platform: | Size: 248832 | Author: aaa | Hits:

[Windows DevelopDES

Description: This about DES ( Data Encryption Standard ) C++ CODE
Platform: | Size: 5120 | Author: Shawn | Hits:

[Linux-UnixTrueCrypt-6.0a-Source.tar

Description: Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/-Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and LinuxMain Features:* Creates a virtual encrypted disk within a file and mounts it as a real disk.* Encrypts an entire partition or storage device such as USB flash drive or hard drive.* Encrypts a partition or drive where Windows is installed (pre-boot authentication).* Encryption is automatic, real-time (on-the-fly) and transparent.* Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).* Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the: http://www.truecrypt.org/
Platform: | Size: 1686528 | Author: yangmuxiang | Hits:

[OtherDES

Description: DES( Data Encryption Standard)算法,于1977年得到美国政府的正式许可,是一种用56位密钥来加密64位数据的方法。DES算法以被应用于许多需要安全加密的场合。(如:UNIX的密码算法就是以DES算法为基础的)。-DES (Data Encryption Standard) algorithm, in 1977 the U.S. government' s official permission, is a 56 with 64-bit key to encrypt data. DES algorithm to be used in many occasions the necessary security encryption. (Such as: UNIX password algorithm is based on DES algorithm).
Platform: | Size: 6144 | Author: lindaqing | Hits:

[Crack HackDES

Description: 数据加密标准(DES)加密解密算法Matlab源代码-Data Encryption Standard (DES) encryption and decryption algorithm Matlab source code
Platform: | Size: 7168 | Author: 新河 | Hits:

[VHDL-FPGA-VerilogDES

Description: This is verilog source code for DES(Data Encryption standard) which is used in network security.
Platform: | Size: 20480 | Author: Krupesh | Hits:

[Crack Hackscr64

Description: a simple project with 64 bit scrambler as data encryption/decryption
Platform: | Size: 1024 | Author: csmr1204 | Hits:

[DSP programscrdsc64

Description: a simple project with 64 bit scrambler as data encryption/decryption
Platform: | Size: 245760 | Author: csmr1204 | Hits:

[Crack HackCLASSE-DATA-ENCRYPTION

Description: Des Algorithme Data Encryption standard
Platform: | Size: 18432 | Author: zizoo | Hits:
« 12 3 4 5 6 7 8 9 10 ... 50 »

CodeBus www.codebus.net