Welcome![Sign In][Sign Up]
Location:
Search - text encryption

Search list

[Crack Hackceaser转换文本加密技术

Description: ceaser转换文本加密技术-converting text encryption technology
Platform: | Size: 6680 | Author: 严国辉 | Hits:

[Crack HackOneTimeNOCList

Description: 使用一次文本加密方法做到数字化文本文件加密-use a text encryption methods do digital text file encryption
Platform: | Size: 2523 | Author: Bo | Hits:

[Crack HackAesEncryption

Description: 这是一个aes的加密算法,可以进行一般的文本加密,还可以用于图象加密,是一个很多人用的算法.-Orangk'aes This is an encryption algorithm that can be a general text encryption can also be used for image encryption, is a lot of people using the algorithm.
Platform: | Size: 2048 | Author: 方泽栋 | Hits:

[Crack HackDES_Encryption

Description: DES加密解密文本文件,使用分组加密方法加密解密数据,分组长度为64位.-DES encryption and decryption of text files, using a method of encryption and decryption of encrypted data, a length of 64.
Platform: | Size: 64512 | Author: liudongxiao | Hits:

[Crack HackIS_Project1

Description: 这是一个文本加密、解密系统,提供了对称加密和非对称加密两种模式。此外,还实现了数字签名及其验证功能。-This is a text encryption, decryption system provides symmetric encryption and asymmetric encryption mode. In addition, implementation of digital signature and the authentication function.
Platform: | Size: 1289216 | Author: 孙一鸣 | Hits:

[Crack HackDMIS_Ch3_InfoHiding

Description: 信息隐藏基础 数字媒体包括了图像、文字以及音频、视频等各种形式,以及传播形式和传播内容中采用数字化,即信息的采集、存取、加工和分发的数字化过程。数字媒体已经成为继语言、文字和电子技术之后的最新的信息载体。 通过本文你可以了解现代密码系统的基本知识,掌握常用的图像加密技术的基本思想。 具体包含: 1 信息隐藏概述 2 隐写术的基本原理 3 隐写 4 隐写分析技术-Information hiding based on digital media including images, text and audio, video and other forms, as well as the spread and dissemination of the contents of the form used in digital, that is, information collection, access, processing and distribution of the digital process. Digital media has become the language and the latest electronic technology of the information carrier. Through this article you can learn the basic of modern cryptography knowledge, the images used to master the basic idea of encryption technology. Specifically includes: 1 information hiding steganography outlined 2 of the 3 basic principles of steganography steganalysis technique 4
Platform: | Size: 370688 | Author: Yummy | Hits:

[Crack HackLorenz_text

Description: Lorenz chaotic generator for encryption text messages
Platform: | Size: 302080 | Author: Elkouny | Hits:

[CA authhidefiles

Description: hide text files using simple encryption algorithnm in matlab
Platform: | Size: 13312 | Author: Sanober | Hits:

[Crack HackRSAprocess

Description: 本程序所设计的RSA加密解密程序能够有效地生成一对RSA体制中的公钥和密钥,并可实现输入的文本与加密成的密文之间的转换,即完成对所给信息的加密和解密工作.-This program is designed to RSA encryption and decryption process can effectively generate a pair of RSA public key and private key system, the input text can be encrypted into the ciphertext with the transition between the given information to complete the encryption and decryption work.
Platform: | Size: 137216 | Author: zhangwei | Hits:

[Crack Hacktext

Description: 文本文件的加密和解密 一个简单的实例说明-Text encryption and decryption
Platform: | Size: 9216 | Author: mtuu | Hits:

[Crack Hackadvanced.text.encryption.decryption.algorithm.code

Description: 文本加密解密算法开发高级代码Development of advanced text encryption and decryption algorithm code -Development of advanced text encryption and decryption algorithm code
Platform: | Size: 110592 | Author: moon | Hits:

[matlabBinary-text-digital-image

Description: 提出了一种可抗 几何攻击的二值文本图像水印算法. 该算法基于DCT,它将二值图像的DCT、图像的视觉特征向 量和加密技术有机结合起来,在提取水印时不需要原始图像,是一种实用的盲水印算法-We propose a geometric attacks against Binary Text Watermarking Algorithm. The algorithm is based on DCT, it binary image DCT, the image of the visual feature vector and encryption technology combine in the watermark without the original image is a practical blind watermarking algorithm
Platform: | Size: 1190912 | Author: 切尔西 | Hits:

[Crack HackText-encryption-Ver1.0.0

Description: 我这个小学生的作品……可加密任何形式的文本-I am the pupil s works ... ... Can encrypt any form of text
Platform: | Size: 4096 | Author: 高昱诚 | Hits:

[Crack HackSimple-text-encryption

Description: 简单的文本加密 与运算一下,但因为对产生错误做了处理。所以可以加密中文。-Simple text encryption and computing, but do produce an error processing. So you can encrypt the Chinese.
Platform: | Size: 38912 | Author: wwh | Hits:

[source in ebookCSharp-text-Encryption-Decryption-Using-AES-advan

Description: C# text Encryption Decryption Using AES advance encryption standard
Platform: | Size: 52224 | Author: mohsen | Hits:

[Software Engineeringencryption-decryption

Description: java project for encryption and decryption using AES algorithme and RSA algorithme, text encryption or images, text file or others formats.
Platform: | Size: 249856 | Author: abou_adnen | Hits:

[OtherSimple-text-encryption

Description: 程序设计一个加密和解密的算法,在对一个指定的字符串加密之后,利用解密函数能够对密文进行解密,显示明文信息-Programming an encryption and decryption algorithm, after a specified string encryption function using the decrypted ciphertext can be decrypted plaintext display
Platform: | Size: 1342464 | Author: | Hits:

[Windows DevelopText-encryption-and-decryption

Description: 演示了一个文本加解密,直接输入内容测试即可-Text encryption and decryption
Platform: | Size: 1024 | Author: 影莫 | Hits:

[e-languageEncryption

Description: 十六位文本加密源码,两款加密制度,QWQ(Sixteen bits of text encryption source code, the two encryption system. Three hundred and sixty degree no dead angle encryption! No risk of leakage!)
Platform: | Size: 7168 | Author: 南街. | Hits:

[Data structstext encryption

Description: 对一个文本串以事先给出的字母映射进行加密,未映射的字符不改变。(A text string is encrypted by the alphabetic map given in advance, and the characters that are not mapped remain unchanged.)
Platform: | Size: 1024 | Author: snwajs | Hits:
« 12 3 4 5 6 7 8 9 10 ... 33 »

CodeBus www.codebus.net