Location:
Search - AES.e
Search list
Description: 在smartphone2003下基于evc++4.0的彩信发送程序-in smartphone2003 based AES 4.0 MMS sent procedures
Platform: |
Size: 1280000 |
Author: 王晴 |
Hits:
Description: 一款可以对邮件内容进行AES加密,并对AES密钥进行RSA加密的邮件收发系统-A mail content can be AES encryption, AES and RSA keys for encryption to send and receive e-mail system
Platform: |
Size: 4685824 |
Author: 李毅 |
Hits:
Description: AES加解密算法实现,包含如下文件
AES.exe
AES.h
AES.cpp
AESDlg.h
AESDlg.cpp
等文件,不一一列举-AES encryption algorithm, including the following documents and other documents AES.exeAES.hAES.cppAESDlg.hAESDlg.cpp not to enumerate
Platform: |
Size: 1067008 |
Author: wj |
Hits:
Description: avaya交换机的开发接口,tsap接口,可以实现CTI开发等功能-Avaya switches interface development, tsap interface, can achieve the development of features such as CTI
Platform: |
Size: 1495040 |
Author: 肖兰习 |
Hits:
Description: SHA加密算法打包文件,电子商务可能会用到此算法加密,去掉后缀“.rar”使用-SHA encryption algorithm packaged documents, e-commerce may be encrypted using this algorithm, remove the suffix " . Rar" use
Platform: |
Size: 19456 |
Author: 万 |
Hits:
Description: SecureCRT 是高度可定制的终端仿真器,适用于 Internet 和
Intranet,支持 IPv6 标准。对于连接到运行 Windows、UNIX 和 VMS 的
远程系统来说,SecureCRT 是理想的选择。
主要特性:
. 广泛的终端仿真:
VT100,VT102,VT220,ANSI,SCO ANSI,Xterm,Wyse 50/60,
和 Linux console 仿真(带有 ANSI 颜色)。
. 优秀的会话管理特性:
新的带标签的用户界面和 Activator 托盘工具,最小化桌面的杂乱。
会话设置可以保存在命名的会话中。
. 协议支持:
支持 SSH1,SSH2,Telnet,RLogin,Serial,和 TAPI 协议。
. Secure Shell:
Secure Shell 加密登录和会话数据,包括以下支持:
- 端口转发使 TCP/IP 数据更安全
- 口令,公钥,键盘交互和 Kerberos 验证
- AES,Twofish,Blowfish,3DES,RC4,和 DES 加密
- X11 转发
. 文件传输工具:
VCP 和 VSFTP 命令行公用程序让使用 SFTP 的文件传输更安全。
. 脚本支持:
支持 VBScript 和 JScript 脚本语言。-SecureCRT 是高度可定制的终端仿真器,适用于 Internet 和
Intranet,支持 IPv6 标准。对于连接到运行 Windows、UNIX 和 VMS 的
远程系统来说,SecureCRT 是理想的选择。
主要特性:
. 广泛的终端仿真:
VT100,VT102,VT220,ANSI,SCO ANSI,Xterm,Wyse 50/60,
和 Linux console 仿真(带有 ANSI 颜色)。
. 优秀的会话管理特性:
新的带标签的用户界面和 Activator 托盘工具,最小化桌面的杂乱。
会话设置可以保存在命名的会话中。
. 协议支持:
支持 SSH1,SSH2,Telnet,RLogin,Serial,和 TAPI 协议。
. Secure Shell:
Secure Shell 加密登录和会话数据,包括以下支持:
- 端口转发使 TCP/IP 数据更安全
- 口令,公钥,键盘交互和 Kerberos 验证
- AES,Twofish,Blowfish,3DES,RC4,和 DES 加密
- X11 转发
. 文件传输工具:
VCP 和 VSFTP 命令行公用程序让使用 SFTP 的文件传输更安全。
. 脚本支持:
支持 VBScript 和 JScript 脚本语言。
Platform: |
Size: 6181888 |
Author: wanggang |
Hits:
Description: AES Encrypt and decrypt. Cmd.
Platform: |
Size: 25600 |
Author: dimk |
Hits:
Description: On-the-fly encryption means that data is automatically encrypted or
decrypted right before is loaded or saved, without any user intervention. No data stored on an
encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct
encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every
file, free space, meta data, etc).
Platform: |
Size: 944128 |
Author: Santhosh R |
Hits:
Description: 该系统同样是在MFC的框架上进行编写。系统实现过程如下:用POP3协议完成邮件接收,用SMTP协议完成邮件的发送,并且对原文内容进行AES加密。然后对AES的密钥进行RSA加密,并将加密后的AES密钥随邮件的正文一起发送给接收方。而接收方在收到邮件之后,首先还原出AES密钥,接着对邮件的内容进行解密,还原出邮件正文。-The system is also in preparation on the MFC framework. System implementation process is as follows: completion of the agreement with the POP3 e-mail reception, complete with the SMTP protocol to send the message, and the contents of the original AES encryption. Then the RSA key for AES encryption, and encrypted with the AES key with the body of the message sent to the receiver. The receiver, after receiving the message, the first reduction of the AES key, then decrypt the contents of the message, restore the message body.
Platform: |
Size: 75776 |
Author: 黎飞 |
Hits:
Description: ALPU加密芯片历经ALPU-04,-05,-B,-E,-MT/MR几个系列的发展,加密性能以及相关技术参数已经趋于完善,可以足够程度的满足客户各类需求。
公司产品使用AES-128对称加密技术,具有很强的加密性能以操作上的灵活性。 相比其他公司的加密芯片,ALPU加密芯片有很高的技术优势。
公司现行推出的产品主要有ALPU-MT,ALPU-MR,ALPU-P以及ALPU-M几款,不同型号的产品在市场定位以及操作模式上有很大出入,具体如下:
供应Neowine专业加密芯片,芯片可实现手机驱动芯片、机顶盒加密,游戏机加密,学习机加密,DVR加密,PMP加密,DVD加密,DMB加密,GPS加密。欢迎致电0755-86299369,Q,1472007603-ALPU encryption chip after ALPU-04,-05,-B,-E,-MT/MR the development of several series, encryption performance, and related technical parameters have been perfected, would be sufficient to meet our customers various levels of demand
Platform: |
Size: 5304320 |
Author: 黄顺正 |
Hits:
Description: Assuming that one could build a machine that could recover a DES key in a second (i.e., try 255 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key. To put that into perspective, the universe is believed to be less than 20 billion years old-Assuming that one could build a machine that could recover a DES key in a second (i.e., try 255 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key. To put that into perspective, the universe is believed to be less than 20 billion years old
Platform: |
Size: 110592 |
Author: vipi |
Hits:
Description: Assuming that one could build a machine that could recover a DES key in a second (i.e., try 255 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key. To put that into perspective, the universe is believed to be less than 20 billion years old-Assuming that one could build a machine that could recover a DES key in a second (i.e., try 255 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key. To put that into perspective, the universe is believed to be less than 20 billion years old
Platform: |
Size: 643072 |
Author: vipi |
Hits:
Description: It is encryption and decryption algorithm.
AES is a symmetric encryption algorithm processing data in block of 128 bits.Under the influence of a key, a 128-bit block is encrypted by transforming it in a unique way into a new block of the same size. AES is symmetric since the same key is used for encryption and the reverse transformation, decryption. The only secret necessary to keep for security is the key. AES may configured to use different key-lengths, the standard defines 3 lengths and the resulting algorithms are named AES-128, AES-192 and AES-256 respectively to indicate the length in bits of the key. Each additional bit in the key effectively doubles the strength of the algorithm, when defined as the time necessary for an attacker to stage a brute force attack, i.e. an exhaustive search of all possible key combinations in order to find the right one.
Platform: |
Size: 1195008 |
Author: asha |
Hits:
Description: 解密/加密 BIn軟件 ~MzCrypt-Description
This is a commandline application that converts back and forth between .bin and .zip.
Usage
- Decrypt .bin:
mzcrypt.exe-d-o update-decrypted.zip update.bin
(converts .bin to .zip)
- Encrypt .bin:
Code:
mzcrypt.exe-e-o ..\su_flash\v1\update.bin update-wholesigned.zip
(converts .zip to .bin)
License
Freeware, same as AES Crypt.
Additional Notes
Source code is attached. Compiled with Visual C++ 9.0.
See 2nd post for GUI version.
Platform: |
Size: 143360 |
Author: 向华 |
Hits:
Description: In traditional image and video content protection schemes, called fully layered, the whole content is first compressed. Then, the compressed bitstream is entirely encrypted using a standard cipher (DES, AES, IDEA, etc.). The specific characteristics of this kind of data (high-transmission rate with limited bandwidth) make standard e
Platform: |
Size: 620544 |
Author: chandrapal singh |
Hits:
Description: OPEN SSL源代码,rsa ,des aes e-OPEN SSL
,rsa ,des aes ecc
Platform: |
Size: 7026688 |
Author: 梁雨枫 |
Hits: