▍des and rsa encryption algorithm procedures
des and rsa encryption algorithm procedures...
des and rsa encryption algorithm procedures...
Using c (Crypto++) Realize, based on the serial number of ecc generated code, including test data, and documents ECDSA...
saving DATA FLOW for 8 bits...
IBE identity-based encryption system of the decryption process, using VC6.0 Development...
JAVA development, the use of RSA, MD5 developed a simple digital signature software, can be used for documents and information to do a digital signature....
Smart Card Example Programs.............
kmlnjlkj nlkjlkjkljl okopokipoipo oipipipo i...
128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms (SHA-1, SHA-256, MD2, MD4, MD5, and RipeMD), 还有 Huffman和Base64算法.- Uses encryption algorithm storehouse which VB writes, including Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5...
Safe support provision connection (SSPI) source code...
Chaos-based encryption algorithm VC++ Test source code for everyone to be a reference...