Description: Sha mainstream hash function source code, can be used for data signatures, is the application of the algorithm, one of the most widely Platform: |
Size: 3203 |
Author:jiang |
Hits:
Description: Realize DES encryption and decryption algorithms, practical simplicity, the procedure can be used as reference Platform: |
Size: 19558 |
Author:李军 |
Hits:
Description: For RAS encryption calculation, but also have to decrypt the calculation, although the interface is simple, but the ideas and methods are fully realize Platform: |
Size: 27143 |
Author:nbb |
Hits:
Description: Based on DES and RSA algorithm for mixed-hybrid cryptosystem Cryptosystem full advantage of the public-key cryptosystem and symmetric cryptographic algorithm the advantages and overcome its shortcomings, every time you s Platform: |
Size: 110473 |
Author:hujun |
Hits:
Description: EditPlus Zhuceji source (editplus Register analysis of part of the algorithm) the need to exchange code or detailed notes please contact me 150353107@qq.com Platform: |
Size: 29533 |
Author:lgs |
Hits: