资源列表
[加密解密] Base64EncryptionandDecryption
说明:Visual Basic 6.0的Base64字符串加密与解密模块,实现字符串的加密与解密,适用与中文文字的加密与解密。-Visual Basic 6.0 is Base64 string encryption and decryption module, string encryption and decryption for the Chinese text encryption and decryption.<huangran> 在 2025-06-25 上传 | 大小:12kb | 下载:0
[加密解密] Doc2
说明:It si about secure data retri using cp-abe in military networks. the user can efficiently retrieve data the storage node. It is very useful in military networks-It si about secure data retri using cp-abe in military networks. the user can efficientl<sabarirajan> 在 2025-06-25 上传 | 大小:12kb | 下载:0
[加密解密] sha
说明:实现安全散列函数sha1,可对任意不超过2^64大小的文件进行操作,产生160bits的摘要,因本人较懒,注释较少,不过程序很好理解。是用c语言实现的。-Secure hash function sha1, can not exceed 2 ^ 64 any size file to operate, generate 160bits summary, because I am more lazy, notes less, but the program is well understood.<杨勇> 在 2025-06-25 上传 | 大小:12kb | 下载:0
[加密解密] bab2
说明:this scr ipt talks about encryption in java which containing the example scr ipt to doing classical cryptography such as classic cipher, transposition cipher, affinecipher and so on. so let s learn together-this scr ipt talks about encryption in java<su> 在 2025-06-25 上传 | 大小:12kb | 下载:0
[加密解密] Hash-Algorithm-Identifier-master
说明:加密算法检测,包含md5 SHA DES AES-Encryption algorithm to detect<2331> 在 2025-06-25 上传 | 大小:12kb | 下载:0
[加密解密] SM4-sbox-in-GF-and-PPRM
说明:分别利用复合域和PPRM结构实现了SM4 S-box,复合域实现方法具有资源消耗优势,但是功耗大,PPRM结构电路具有结构简单,功耗小的优势。 -Respectively by composite domain and PPRM structure enables SM4 S-box, composite domain implementation method has advantages in resources consumption, but power consumption, PPR<wangyi> 在 2025-06-25 上传 | 大小:12kb | 下载:0
[加密解密] secure-util
说明:Base64编码摘要:对称(DES,3DES,AES,IDEA)/非对称(RSA,ELGamal)加解密,RSA/DSA数字签名,数字证书.-Abstract: symmetric (DES, 3DES, AES, IDEA)/asymmetric (RSA, ELGamal) encryption and decryption, RSA/DSA digital signature, digital certificate.<段维波> 在 2025-06-25 上传 | 大小:12kb | 下载:0
[加密解密] Analysis-of-IP-fragment--attacks
说明:本文对linux的IP组装算法进行了分析,因为IP碎片经常用于DOS等攻击,在文章后面我结合了一些攻击方法进行了更进一步的说明 -In this paper, the IP linux assembly algorithm analysis, because the IP fragments are often used in attacks such as DOS, later in the article I combine several attack methods are furt<tang> 在 2025-06-25 上传 | 大小:12kb | 下载:0
[加密解密] 2445.lua[1]
说明:自动更新yinglin引领互联网激动抓取数据-Automatic Updates excited to lead the leading Internet data capture<kuku8989> 在 2025-06-25 上传 | 大小:12kb | 下载:0