Description: an encryption and decryption example, the use of symmetric cryptography file encryption, provide the user interface visualization, understand the process of encryption and decryption results Platform: |
Size: 7795 |
Author:gongchao |
Hits:
Description: traditional offline store two VC-2 source offline store VC-2 source offline store VC-2 source offline store VC-2 source offline store VC FO Platform: |
Size: 70049 |
Author:frank |
Hits:
Description: completed digital image encryption and decryption process. be right. BMP or. JPG format images encryption and digital watermarking completion of the Secretariat of the key functions of extraction. The encryption algorith Platform: |
Size: 1018277 |
Author:wukongpei |
Hits:
Description: use of the NTL large integer achieve RSA public key cryptography algorithm, can be used to text file encryption and decryption. Windows98 platform above, VC 6.0, trails are internal documents relative path, we can not co Platform: |
Size: 1917069 |
Author:李刚 |
Hits:
Description: how machines identification (CPU serial number, network card mac address), Serial Number Generation, to your software works to protect and allow access to only the machines register code, You can run the software or can Platform: |
Size: 1481143 |
Author:定高翔 |
Hits: