Welcome![Sign In][Sign Up]
Location:
Search - crypto t

Search list

[Windows MobileWinCECommunicateCD

Description: Most code samples included on this CD were developed with Microsoft Visual C++ version 5.0 and the Microsoft Windows CE Toolkit for Visual C++ version 5.0. The Sspi and Crypto samples were developed with Microsoft Visual C++ version 6.0 and the Microsoft Windows CE Toolkit for Visual C++ 6.0. The code in sample applications is ported for a Handheld PC, but the programming concepts that are presented apply to all Windows CE-based platforms. -Most code samples included on this CD were d eveloped with Microsoft Visual C version 5.0 an d the Microsoft Windows CE Toolkit for Visual C v ersion 5.0. The Sspi and Crypto samples were dev eloped with Microsoft Visual C version 6.0 and t he Microsoft Windows CE Toolkit for Visual C 6.0 . The sample code in applications is ported for a Handheld PC, but the programming concepts that are presente d apply to all Windows CE-based platforms.
Platform: | Size: 406184 | Author: 王小彬 | Hits:

[Crack Hack300_encrypt

Description: 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives : - To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output - To share a file into shadows : cryptest's
Platform: | Size: 389062 | Author: Nikii | Hits:

[ARM-PowerPC-ColdFire-MIPSl_ipp-sample-crypto_p_5.0.006.tar

Description: 这是在PCA下的基于IPP库示例代码例子,在网上下了IPP的库之后,设置相关参数就可以编译该代码.-This is the PCA based on the sample code IPP for example, the Internet under the IPP libraries, the provision of the relevant parameters can compile the code.
Platform: | Size: 21504 | Author: OneGun | Hits:

[Windows MobileWinCECommunicateCD

Description: Most code samples included on this CD were developed with Microsoft Visual C++ version 5.0 and the Microsoft Windows CE Toolkit for Visual C++ version 5.0. The Sspi and Crypto samples were developed with Microsoft Visual C++ version 6.0 and the Microsoft Windows CE Toolkit for Visual C++ 6.0. The code in sample applications is ported for a Handheld PC, but the programming concepts that are presented apply to all Windows CE-based platforms. -Most code samples included on this CD were d eveloped with Microsoft Visual C version 5.0 an d the Microsoft Windows CE Toolkit for Visual C v ersion 5.0. The Sspi and Crypto samples were dev eloped with Microsoft Visual C version 6.0 and t he Microsoft Windows CE Toolkit for Visual C 6.0 . The sample code in applications is ported for a Handheld PC, but the programming concepts that are presente d apply to all Windows CE-based platforms.
Platform: | Size: 405504 | Author: 王小彬 | Hits:

[Crack Hack300_encrypt

Description: 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives :- To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algorithms-160 message digests : cryptest m file-To encrypt and decrypt a string using DES-EDE in CBC mode : cryptest t-To encrypt or decrypt a file cryptes t e | d input output- To share a file into shadows : cryptest's
Platform: | Size: 389120 | Author: Nikii | Hits:

[Crack Hackcrypto-tools-20071215.tar

Description: A Linux port of the OpenBSD/FreeBSD Cryptographic Framework (OCF). This port aims to bring full asynchronous HW/SW crypto acceleration to the Linux kernel, OpenSwan, OpenSSL and applications using DES, 3DES, AES, MD5, SHA, PublicKey, RNGs and more.
Platform: | Size: 9216 | Author: ygt | Hits:

[Linux-Unixnss_util

Description: On some platforms, we use NSS for SSL only -- we don t use NSS for crypto or certificate verification, and we don t use the NSS certificate and key databases for Linux. -On some platforms, we use NSS for SSL only -- we don t use NSS for crypto or certificate verification, and we don t use the NSS certificate and key databases for Linux.
Platform: | Size: 6144 | Author: xujovou | Hits:

[Linux-Unixcrypto-atmel

Description: old gpio interface to other kernel modules don t use in new code, will go away in 2.7 have a look at bttv-gpio.c instead.
Platform: | Size: 2048 | Author: fongctvn | Hits:

[OtherVisual-Basic-2005-Express-Edition-for-Dummies

Description: visual basic.NET During the 1990s, far more programmers chose to use Visual Basic than all other programming languages combined. Estimates range 3 million to 6 million active VB developers. In spite of its popularity — or perhaps partly because of it — some programmers lifted their noses into the air, sniffed, and claimed that VB wasn’t a “serious” language. In other words, the languages they used were more difficult (strange punctuation, bizarre vocabulary, confusing syntax, and so on) and sometimes required much more time than VB to finish a project. But in the early days, those languages did have a significant advantage: They could be used to build programs that accomplished some jobs faster and better than VB. In fact, some tasks were simply impossible in VB. Using the Windows Crypto API to encrypt files, for example, required an expert C++ guru. Now, though, you can use VB Express to quite easily tap into more security power than the Crypto API ever offered. No gurus required.-visual basic.NET During the 1990s, far more programmers chose to use Visual Basic than all other programming languages combined. Estimates range 3 million to 6 million active VB developers. In spite of its popularity — or perhaps partly because of it — some programmers lifted their noses into the air, sniffed, and claimed that VB wasn’t a “serious” language. In other words, the languages they used were more difficult (strange punctuation, bizarre vocabulary, confusing syntax, and so on) and sometimes required much more time than VB to finish a project. But in the early days, those languages did have a significant advantage: They could be used to build programs that accomplished some jobs faster and better than VB. In fact, some tasks were simply impossible in VB. Using the Windows Crypto API to encrypt files, for example, required an expert C++ guru. Now, though, you can use VB Express to quite easily tap into more security power than the Crypto API ever offered. No gurus required.
Platform: | Size: 3361792 | Author: bek | Hits:

CodeBus www.codebus.net