Description: This the realization of the four E1 interfaces 8M tied up the realization of the logic transmission source, the largest fault-tolerant capability for 100MS, tied to other transmission lines may also be a reference! Platform: |
Size: 1878910 |
Author:王宣强 |
Hits:
Description: The source code for encryption and decryption without a password set up, after decompression can be used. Platform: |
Size: 125146 |
Author:塔塔米尔 |
Hits:
Description: RSA encryption C source code 1978 on the emergence of this algorithm, it is the first not only for data encryption can be used for digital signature algorithms. It is easy to understand and operate, but also very popular Platform: |
Size: 5572 |
Author:zen |
Hits:
Description: In this case the use of Delphi to achieve classic DES encryption and decryption algorithms, user-friendly, full-featured, code written specification is available for reference! Platform: |
Size: 339982 |
Author:陈龙云 |
Hits:
Description: In this case the use of Delphi to achieve classic MD5 encryption algorithm, available for everyone to participate, I reprint! Platform: |
Size: 31918 |
Author:陈龙云 |
Hits:
Description: The software is a text file of data security has been prepared, it can be selected to carry out a text file Encryption and Decryption operation. Operation is very simple, first selected to Canada and decrypt a text file, Platform: |
Size: 54718 |
Author:Hejun |
Hits:
Description: Huffman coding on the document and then read the contents of decoding and then encoding Platform: |
Size: 9863 |
Author:jiang zhenhua |
Hits:
Description: blowfish encryption algorithm of the coding categories, using VC6 development, first by using BlowfishKeyInit () on the key used by blowfish initialization. Platform: |
Size: 8056 |
Author:gongyiling |
Hits: