Description: It is a visual C 6.0 mfc prepared Haiming coding procedures, to achieve the Haiming codes, and an error. Platform: |
Size: 356352 |
Author:lanxin |
Hits:
Description: use JAVA encryption and decipher these two approaches to string the encryption and decryption. Platform: |
Size: 2048 |
Author:翁振銘 |
Hits:
Description: This is an encryption algorithm on paper, the text using neural network encryption algorithm! Platform: |
Size: 27648 |
Author:申俊歌 |
Hits:
Description: to the blight on the face in the face to the blight on the land in the blight on the face to face in the litter on the way to the blight on the face in the in blight on the face to face in the dry in the manner in the fa Platform: |
Size: 9216 |
Author:king |
Hits:
Description: DES encryption and decryption and MAC algorithm, in a number of products have been practical applications, without any modification to use. Platform: |
Size: 39936 |
Author:陈强 |
Hits:
Description: prime number generation algorithm used to generate the public key, CA public key distribution. Platform: |
Size: 161792 |
Author:liang |
Hits: