Location:
Search - encrypt
Search list
Description: 基于异步长和密钥的文件加密解密,利用2进制方式读取文件,理论上可以加解密一切文件,但是具体应用要根据文件的不同而修改文件结束符-Based on asynchronous long file and key encryption and decryption. Reading zhe file by binary mode.In theory this software can used to encrypt and decrypt all kinds of files,but we should change the end operator according to different files
Platform: |
Size: 1624064 |
Author: 朱晓骏 |
Hits:
Description: Transpositionchiper for encrypt and decrypt our messagge, so we can learn about how to encrypt and decrpyt by transpositionchipper
Platform: |
Size: 15360 |
Author: lisa |
Hits:
Description: RSA算法是最著名的公开密码体制。基于大数分解的难度。其公开密钥和私人密钥是一对大素数的函数,从一个公开密钥和密文中恢复出明文的难度等价于分解两个大素数之积。算法过程:首先是设计密钥,然后是对消息加密,最后是对密文解密。-RSA algorithm is the most famous public cryptosystem. Based on the difficulty of large integer. Its public key and private key is a function of large prime numbers, from a public key and the ciphertext to recover the plaintext of the difficulty is equivalent to decompose the product of two large prime numbers. Algorithm process: first is to design the key, then encrypt the message, and finally to decrypt the ciphertext.
Platform: |
Size: 1892352 |
Author: 古狸 |
Hits:
Description: RSA算法是最著名的公开密码体制。基于大数分解的难度。其公开密钥和私人密钥是一对大素数的函数,从一个公开密钥和密文中恢复出明文的难度等价于分解两个大素数之积。算法过程:首先是设计密钥,然后是对消息加密,最后是对密文解密。-RSA algorithm is the most famous public cryptosystem. Based on the difficulty of large integer. Its public key and private key is a function of large prime numbers, from a public key and the ciphertext to recover the plaintext of the difficulty is equivalent to decompose the product of two large prime numbers. Algorithm process: first is to design the key, then encrypt the message, and finally to decrypt the ciphertext.
Platform: |
Size: 2835456 |
Author: 古狸 |
Hits:
Description: this is a project about security information containing how to encrypt a file
Platform: |
Size: 9816064 |
Author: Iosib Laura-Stefana |
Hits:
Description: source code to encrypt files with Visual Basic 6.0, please be further developed -source code to encrypt files with Visual Basic 6.0, please be further developed ..
Platform: |
Size: 82944 |
Author: Aminul Aprijal |
Hits:
Description: source code to encrypt files with Visual Basic 6.0, please be further developed -source code to encrypt files with Visual Basic 6.0, please be further developed ..
Platform: |
Size: 13312 |
Author: Aminul Aprijal |
Hits:
Description: ECC Cryptography, to encrypt and decrypt message-ECC Cryptography, to encrypt and decrypt message..
Platform: |
Size: 3072 |
Author: andy |
Hits:
Description: ECC Cryptography, to encrypt and decrypt message-ECC Cryptography, to encrypt and decrypt message..
Platform: |
Size: 5120 |
Author: andy |
Hits:
Description: ECC Cryptography, to encrypt and decrypt message-ECC Cryptography, to encrypt and decrypt message..
Platform: |
Size: 1024 |
Author: andy |
Hits:
Description: ECC Cryptography, to encrypt and decrypt message-ECC Cryptography, to encrypt and decrypt message..
Platform: |
Size: 4096 |
Author: andy |
Hits:
Description: ECC Cryptography, to encrypt and decrypt message-ECC Cryptography, to encrypt and decrypt message..
Platform: |
Size: 3072 |
Author: andy |
Hits:
Description: a console program in cryptography permet to encrypt and decrypt text using the method of Vigenere.
Platform: |
Size: 3072 |
Author: CBIR |
Hits:
Description: This C++ program can encrypt files written in binary, any time be careful because if you go wrong encryption key data may be lost.
Platform: |
Size: 8192 |
Author: CBIR |
Hits:
Description: is to encrypt any type of file with an encryption key to 100 characters, and sufit to drag the file to encrypt the executable
Platform: |
Size: 9216 |
Author: CBIR |
Hits:
Description: it is a project on how to encrypt & decrypt any file using RSA algorithm
Platform: |
Size: 1024 |
Author: neha laskar |
Hits:
Description: NOR 加密兼容任何文件。NOR is compatible with any file encryption-NOR encrypt any file compatibility. NOR is compatible with any file encryption
Platform: |
Size: 80896 |
Author: 吴凯 |
Hits:
Description: HashLib,在涉及到加密解密算法的时候,都使用到加密库,这里提供的算法常用的经典算法,源码有CB和Delphi-HashLib, when it comes to encryption and decryption algorithms, it also uses to encrypt the database, the algorithm used here are classic algorithms, and Delphi source code with CB
Platform: |
Size: 165888 |
Author: 虾虾 |
Hits:
Description: 采用基于RSA的加密与解密算法实现对字符串的加密和解密的处理-Based on RSA encryption and decryption algorithms to encrypt and decrypt the string handling
Platform: |
Size: 8192 |
Author: 黄忠 |
Hits:
Description: audio steganography file to encrypt text in audio file
audio steganography file to encrypt text in audio file
Platform: |
Size: 507904 |
Author: mam |
Hits:
«
1
2
...
45
46
47
48
49
50»