搜索资源列表
loki加密算法C语言源代码
- loki加密算法 /* This is an independent implementation of the encryption algorithm: */ /* */ /* LOKI97 by Brown and Pieprzyk */ /*
AES候选算法,安全性高于3DES而速度快过DES
- AES候选算法,安全性高于3DES而速度快过DES-candidate for AES, 3DES and safe to speed faster than DES
rc6优化算法
- RC6优化算法,是一个优化的加密算法,是AES候选算法之一-RC6 algorithm optimization, optimization is an encryption algorithm, AES is a candidate for one
mars加密算法
- 加解密算法,AES候选算法,安全性高于3DES而速度快过DES-encryption and decryption algorithms, AES algorithm candidate, safe in 3DES and faster than DES
fair
- 在程序中由playfair(char *s,int length) 的实现加密和解密;解密原理与加密类似,只是加密过程的逆过程,它基于密文,采用同行取左边,同列取下边,其余取交叉的相反原理;在程序中用FLAG标识区别,当其值为1时,为加密过程;值为0时,为解密过程。-in the proceedings by PLAYFAIR (char * s, int length) the realization of encryption and decryption; encryption and d
Rijndael
- Rijndael(读作rain-dahl)是由美国国家标准与技术协会(NIST)所选的高级加密标准(AES)的候选算法。它是从最后的5个候选方案中选出的,而这5个候选方案又是从刚开始的15个算法中选出的。今后的几年内,在许多密码术的应用中Rijndael将逐步取代数据加密标准(DES)以及后来的Triple DES。-Rijndael (pronounced rain-dahl) is from the United States National Institute of Standards
Password.Door-v8.2.8
- 综合的加密软件可以对候选客流量为中华人民共和国-Encryption software can be integrated traffic on the candidate for the People s Republic of China
secret
- pass.words是弱口令字典,是一个纯文本文件,每行一个口令,可以向里面添加候选口令。 pass.c是进行口令检查的c语言原程序,有两个命令行参数 -w file: 可以使用该选项指定口令字典 -P:默认情况下对/etc/shadow中的用户检查弱口令,可以使用该选项指定检查的文件 编译gcc –o pass pass.c –l crypt 由于要使用加密函数,所以要使用加密库crypt,使用选项-l crypt 运行程序:pass –w ./pass.words –
softhy597g
- 适用于企事业单位、管理部门等在确定了某个候选的新闻、事件、活动、图片、徽标、歌曲等候选项目后,由本单位职工或其他任何人通过网络进行投票,选出其中几项的投票活评选活动。 -Applicable to enterprises and institutions, such as management identified a candidate in the news, events, activities, pictures, logos, songs such as the candidate
ss
- 一个用于面试时的面试管理系统,具有查看应聘者的资料和给其打分的功能。-One for the interview at the time of the interview management system, with a view candidate information and points to its function.
ccrypt-1.9
- ccrypt is a command line utility for encrypting and decrypting files and streams. It was designed as a replacement for the standard Unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael cip
nist
- Random and pseudorandom bit generators (RBGs, PRBGs) are used for many purposes including cryptographic, modeling, and simulation applications. For cryptographic purpose, they are required in the construction of encryption keys, other cryptographic p
ExamOnLine
- 为了保障整个系统的安全性,在线考试系统实现了分类验证的登录模块,在抽取试题上,系统使用随机抽取试题的方式,体现了考试的客观与公正。当考生答题完毕之后,提交试卷即可得知本次考试的得分,体现系统的高效性。在后台管理上,分后台管理员管理模块和试题管理模块。分别适应不同的用户,前者只有系统的高级管理员才能进入,对整个系统进行管理。-In order to protect the security of the whole system, online examination system to achi
vote.tar
- 电子投票系统,基于Linux的c代码,实现管理员及候选人、普通用户的初始化及管理。实现了对候选人的电子投票业务。-Electronic voting system, based on Linux, c code, administrators and candidates to achieve the average user initialization and management. Implement electronic voting for the candidate business
LUCIFER
- IBM 提交了一个候选算法,它是 IBM 内部开发的,名为 LUCIFER。在美国国家安全局 (NSA) 的“指导”下完成了算法评估之后,在 1977 年 7 月 15 日,NBS 采纳了 LUCIFER 算法的修正版作为新的数据加密标准.-IBM has submitted a candidate algorithm, which is IBM' s internal development, called LUCIFER. In the United States National S
SHA3
- 带界面的hash算法,分别提供了CUBEHASH、 CROSTL、LANE、SHABAL、SPECTRAL物种候选sha3算法-Interface with the hash algorithm, respectively, provide CUBEHASH, CROSTL, LANE, SHABAL, SPECTRAL species candidate sha3 algorithm
rc6
- rc6 algorithm an c++ language.Rc6 is the candidate in NISt.
Third-Advanced-Encryption-Standard-Candidate-Conf
- Third Advanced Encryption Standard Candidate Conference:AES3
sha3
- 已经进入第三轮SHA-3候选算法竞选中的Keccak算法-Already in the third round of SHA- 3 candidate algorithms Keccak algorithm in the campaign
wpa_core
- Network configuration block - holds candidate connection parameters.