搜索资源列表
Encrypt
- What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in \"c\" also.) Program fl
loop-AES-v3.2b
- Fast and transparent file system and swap encryption package for linux. No source code changes to linux kernel. Works with 2.6, 2.4, 2.2 and 2.0 kernels.
AN177
- Digital PLL design, all technic how to develope eficiency digital locked loop. All descr iptions in English in details and examples
an535
- Digital PLL design, all technic how to develope eficiency digital locked loop. All descr iptions in English in details and examples
AN5355
- Digital PLL design, all technic how to develope eficiency digital locked loop. All descr iptions in English in details and examples
pll
- Digital PLL design, all technic how to develope eficiency digital locked loop. All descr iptions in English in details and examples
vbSHA1
- 自己写一个SHA1算法类源代码,和流传的比较广泛的VB版本的MD5的代码比较下 就能发现里面的轮转的2种写法 1种用的是循环赋值,比较简捷 另1种则是把循环打开了,便于调试 2种写法各有优劣-Write a SHA1 algorithm class source code, and the spread of the more extensive version of the MD5 VB code can be found under more insi
md5
- MD5算法的实现以及分析,主循环有四轮(MD4只有三轮),每轮循环都很相似。第一轮进行16次操作。每次操作对a、b、c和d中的其中三个作一次非线性函数运算,然后将所得结果加上第四个变量,文本的一个子分组和一个常数。再将所得结果向右环移一个不定的数,并加上a、b、c或d中之一。最后用该结果取代a、b、c或d中之一。-MD5 algorithm implementation and analysis, the main loop there are four rounds (MD4 only thr
password
- 作品名称:数字密码加密程序(三次改进版)作品目的:增加对条件指令、循环指令的了解并熟悉自定义函数、调用函数的方法以及文件处理指令作品功能:实现注册验证及对数字进行加密、解密功能,作品改进:利用软件爆破原理改进了程序输入正确序列号重启后仍需再次输入序列号的缺陷作品缺陷:程序判断用户的选择只能用数字否则出错(尝试用过char类型),只能加密9位数字否则不能正确解密(此BUG与算法无关),无论注册码是否正确重启程序后需再次输入序列号.以上原因尚不明确!⊙﹏⊙b汗.希望各位能多多指教 -Title
MD5haiqi
- 一个循环修改MD5 的源码 防止360查杀-MD5 of the source code to modify a loop to prevent killing 360
aes_inv_sbox
- The inverse S-box is used in the decrypting function inv_cipher to revert the substitution carried out via the S-box. The corresponding AES-Matlab function declared in Line 1 of Listing 7 takes the Sbox (s_box) as its input and generates the in
aes_key_expand_128
- The key expansion function takes the user supplied 16 bytes long key and utilizes the previously created round constant matrix rcon and the substitution table s_box to generate a 176 byte long key schedule w, which will be used during the en- and
DES--C
- DES 使用一个 56 位的密钥以及附加的 8 位奇偶校验位,产生最大 64 位的分组大小。这是一个迭代的分组密码,使用称为 Feistel 的技术,其中将加密的文本块分成两半。使用子密钥对其中一半应用循环功能,然后将输出与另一半进行“异或”运算;接着交换这两半,这一过程会继续下去,但最后一个循环不交换。DES 使用 16 个循环,使用异或,置换,代换,移位操作四种基本运算-DES uses a 56 key , as well as 8 additional parity bit , resu
hashgaoshushixian
- 哈希函数加密算法的高速实现,结合"循环打开"和"路径优先"两大技术,提出基于FPGA的SHA加密算法高速实现.-High-speed implementation of the hash function encryption algorithm, combining the two technologies " loop open" and " Path First proposed to achieve high-speed FPGA-based SHA encry
AES
- The AES cipher core consists of a key expansion module, an initial permuta- tion module, a round permutation module and a final permutation module. The round permutation module will loop internally to perform 10 iteration (for 128 bit keys).
Vigenere
- 为了提高密码的破译的难度,人们有发明一种多表置换的密码,即一个明文字母可以表示为多个密文字母,多表密码加密算法结果将使得对单表置换用的简单频率分析方法失效,其中维吉尼亚密码就是一种典型的加密方法。维吉尼亚密码是使用一个词组(语句)作为密钥,词组中每一个字母都作为移位替换密码密钥确定一个替换表,维吉尼亚密码循环的使用每一个替换表完成明文字母到密文字母的变换,最后所得到的密文字母序列即为加密得到的密文(In order to improve the difficulty of deciphering