搜索资源列表
VBCrypto2.zip
- 使用VB写的加密算法库,包括Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms (SHA-1, SHA-256, MD2, MD4, MD
java加密技术
- java加密技术:除了DES,我们还知道有DESede(TripleDES,就是3DES)、AES、Blowfish、RC2、RC4(ARCFOUR)等多种对称加密方式,其实现方式大同小异,这里介绍对称加密的另一个算法——PBE-java encryption technology: In addition to DES, we also know DESede (TripleDES, that is, 3DES), AES, Blowfish, RC2, RC4 (ARCFOUR) and o
rc.zip
- 含有rc2、rc4、rc5、rc6算法的rc算法集合, Includes rc2, rc4, rc5, rc6 the algorithm rc algorithm gathers
VBCrypto2.zip
- 使用VB写的加密算法库,包括Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms (SHA-1, SHA-256, MD2, MD4, MD
NCSetup-1.1a
- 很好的加密数据工具,支持多种加密算法,如DES、AES、RC2、RC4、RC5、IDEA、CAST-128-A very good tool for encrypted data to support a variety of encryption algorithms
101259367DES
- des的加脱密算法用c语言实现以及一些其他的密码算法-Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms (SHA-1, SHA-256,
main_prog_lcd
- PIC16F690上接LCD 1602A的显示驱动 Set these pins to outputs: PORTC: RC0 -> PIN 11 (DATA, DB4) RC1 -> PIN 12 (DATA, DB5) RC2 -> PIN 13 (DATA, DB6) RC3 -> PIN 14 (DATA, DB7) RC4 -> PIN 6 (E) RC5 -> PIN 4 (RS) LC
VBCrypto
- VBCrypto源码库大全源码,这是一个良好的编译算法,由如下算法组成:10种流行的加密算法(Blowfish, Twofish, Rijndael, Skipjack, Serpent, Gost, RC2, RC4, TEA, DES, 3DES, 3DES112, DESE, CAST5, IDEA),6种流行的单一的哈希算法(MD2, MD4, MD5, SHA, SHA256, RipeMD)以及一个huffman压缩算法。-The VBCrypto source libraries
LONGKYE16F505
- 本实例用PIC16F505单片机, 按键定位脚:RC3,RC4. LED指示灯输出:RC0 RC1 RC2 实现功能:短击RC3脚按键,RC0上的LED亮,RC1,RC2上的LED不亮。长按RC3上的按键,RC1,RC2上的LED亮,RC0上的灯灭。 RC4上的按键作为关机键(不管是短击状态还是长击状态都可以关机)。 -PIC16F505 microcontroller used in this example, the key positioning feet: RC3,
Comparison-Based-Analysis-of-Different-Cryptograp
- Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of techn
HexEnc_demo
- [rc] Includes rc2, rc4, rc5, rc6 the algorithm rc algorithm gathers [rc5] RC5 Image encryption in matlab [Raji-mam] image compression and encryption
hacker-detection-in-wireless-pr
- Includes rc2, rc4, rc5, rc6 the algorithm rc algorithm gathers image compression and encryption
ajm232_code_201105161112
- [rc] Includes rc2, rc4, rc5, rc6 the algorithm rc algorithm gathers [rc5] RC5 Image encryption in matlab [Raji-mam] image compression and encryption