Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - Crypto
Search - Crypto - List
DL : 0
crypto math operations and data types.
Update : 2024-05-17 Size : 9216 Publisher : taznpi

visual basic.NET During the 1990s, far more programmers chose to use Visual Basic than all other programming languages combined. Estimates range 3 million to 6 million active VB developers. In spite of its popularity — or perhaps partly because of it — some programmers lifted their noses into the air, sniffed, and claimed that VB wasn’t a “serious” language. In other words, the languages they used were more difficult (strange punctuation, bizarre vocabulary, confusing syntax, and so on) and sometimes required much more time than VB to finish a project. But in the early days, those languages did have a significant advantage: They could be used to build programs that accomplished some jobs faster and better than VB. In fact, some tasks were simply impossible in VB. Using the Windows Crypto API to encrypt files, for example, required an expert C++ guru. Now, though, you can use VB Express to quite easily tap into more security power than the Crypto API ever offered. No gurus required.-visual basic.NET During the 1990s, far more programmers chose to use Visual Basic than all other programming languages combined. Estimates range 3 million to 6 million active VB developers. In spite of its popularity — or perhaps partly because of it — some programmers lifted their noses into the air, sniffed, and claimed that VB wasn’t a “serious” language. In other words, the languages they used were more difficult (strange punctuation, bizarre vocabulary, confusing syntax, and so on) and sometimes required much more time than VB to finish a project. But in the early days, those languages did have a significant advantage: They could be used to build programs that accomplished some jobs faster and better than VB. In fact, some tasks were simply impossible in VB. Using the Windows Crypto API to encrypt files, for example, required an expert C++ guru. Now, though, you can use VB Express to quite easily tap into more security power than the Crypto API ever offered. No gurus required.
Update : 2024-05-17 Size : 3361792 Publisher : bek

DL : 0
brief crypto_policy_t describes a particular crypto policy that can be applied to an SRTP stream.
Update : 2024-05-17 Size : 20480 Publisher : sokanls

Catsoft Crypto DLL for PB/VB
Update : 2024-05-17 Size : 90112 Publisher : joe pdnuser

datatypes_driver.c a test driver for crypto math datatypes. -datatypes_driver.c a test driver for crypto math datatypes.
Update : 2024-05-17 Size : 3072 Publisher : jhxtqang

DL : 0
This based largely upon arch x86 crypto aesni-intel glue.c. -This is based largely upon arch x86 crypto aesni-intel glue.c.
Update : 2024-05-17 Size : 6144 Publisher : gkxaqx

DL : 0
Michael MIC crypto setup.Copy header into buffer. We need the padding on the end zeroed.
Update : 2024-05-17 Size : 1024 Publisher : jangzprs

DL : 0
sha2-ce-glue.c - SHA-224 SHA-256 using ARMv8 Crypto Extensions.
Update : 2024-05-17 Size : 1024 Publisher : krherqp

DL : 0
sha1-ce-glue.c - SHA-1 secure hash using ARMv8 Crypto Extensions.
Update : 2024-05-17 Size : 1024 Publisher : nongsmja

DL : 0
eCryptfs: Linux filesystem encryption layer.
Update : 2024-05-17 Size : 15360 Publisher : kongcdxao

DL : 1
This is based largely upon crypto sha256_generic.c.
Update : 2024-05-17 Size : 6144 Publisher : saivubeng

DL : 0
RNG: Random Number Generator algorithms under the crypto API.
Update : 2024-05-17 Size : 3072 Publisher : rougomi

DL : 0
crypto asn1 a i2d fp.c Source Code for Linux v2.13.6.
Update : 2024-05-17 Size : 2048 Publisher : perxoufu

DL : 0
2.2 eay - added include crypto.h so the memory leak checking code is present. eay 18-Jun-98 Source Code for Linux v2.13.6. -2.2 eay - added include crypto.h so the memory leak checking code is present. eay 18-Jun-98 Source Code for Linux v2.13.6.
Update : 2024-05-17 Size : 7168 Publisher : haopeisg

DL : 0
Redistributions of source code must retain the above copyright Kernel Device Driver for linux v2.13.6.
Update : 2024-05-17 Size : 5120 Publisher : txzadh

DL : 0
vigenere, ciphertext, crypto, cryptography, encrypt, decrypt,
Update : 2024-05-17 Size : 848896 Publisher : Audrey95

DL : 0
Educational tool. Shows schemes of simple crypto protocols.
Update : 2024-05-17 Size : 10546176 Publisher : Vlad

模仿DES的结构,采用sm4的s盒,可以实现文本的加密和解密,重点在于Feistel结构的演示。-DES mimic the structure, using sm4 of s box, you can achieve text encryption and decryption, focusing on demonstration Feistel structure.
Update : 2024-05-17 Size : 290816 Publisher : lin yang

DL : 0
Source code for Crypto API utils
Update : 2024-05-17 Size : 3072 Publisher : tu6693580

DL : 0
AES加解密,C++端采用crypto++加密,C#端解密,经测试能够完全还原-AES Encryption & Decryption
Update : 2024-05-17 Size : 1055744 Publisher : ray
« 1 2 ... 20 21 22 23 24 2526 27 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.