Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - blowfish
Search - blowfish - List
DL : 0
此压缩包内有cast、blowfish、simple、des、cryptlib、rsa、mqueue、xtrcrypt、gf256、 base32,base64、modexppc、network等一些的常见加密、解密算法,非常全的算法集合,源码爱好者大致查了一下,超过130个,全部可以编译通过,而且还包含有E文的开发文档,研究学习算法的可不要错过。-This archive contains cast, blowfish, simple, des, cryptlib, rsa, mqueue, xtrcrypt, gf256, base32, base64, modexppc, network and some of the common encryption, decryption algorithm, the algorithm is the whole set of source enthusiasts generally Charles a moment more than 130, all you can compile, but also contains the text of the development of the document E, of learning algorithms can not miss.
Update : 2024-05-18 Size : 8412160 Publisher : 胡杨

DL : 0
simulate Blowfish alogrithm
Update : 2024-05-18 Size : 766976 Publisher : vyhq2003

DL : 0
CipherWall Client, code to work with sockets, sqlite database and CA realization: - RSA 2048-4096 bit - digit auth on RSA - 3-step cert auth - Blowfish in CFB mode (448 bit) - SHA-256 и SHA-512 - HMAC on base SHA-256 - random-digit genereator ANSI X9.17 - CRC32 - DoD-5220.22-M
Update : 2024-05-18 Size : 94208 Publisher : Andrey

DL : 0
CipherWall Client, code to work with sockets, sqlite database and CA realization: - RSA 2048-4096 bit - digit auth on RSA - 3-step cert auth - Blowfish in CFB mode (448 bit) - SHA-256 и SHA-512 - HMAC on base SHA-256 - random-digit genereator ANSI X9.17 - CRC32 - DoD-5220.22-M
Update : 2024-05-18 Size : 131072 Publisher : Andrey

DL : 0
使用dll,将vc下进行文件加解密的blowfish方法做成dll文件,从而在vc中调用,隐藏加解密的参变量。-Using dll, under the vc the blowfish file encryption method made dll file, so call in vc, the hidden variable encryption and decryption of the parameters.
Update : 2024-05-18 Size : 334848 Publisher : 张强

ceasar cipher encryption program in c language Kor
Update : 2024-05-18 Size : 193536 Publisher : ilseobshin

DL : 0
使用BlowFish实现的加密和解密动态库源码-BlowFish achieved using dynamic library source code encryption and decryption
Update : 2024-05-18 Size : 26624 Publisher : 丁敬

Java中的Blowfish对称密钥加密算法类和实例-Java in the Blowfish symmetric key encryption algorithm classes and instances
Update : 2024-05-18 Size : 15360 Publisher : lisheng

IGEM2全套清客控件(20081130整理)-IGEM2 full QingKe control (20081130 finishing)
Update : 2024-05-18 Size : 58243072 Publisher : 我本沉默

DL : 0
blowflsh - encrypt/decrypt
Update : 2024-05-18 Size : 25600 Publisher : freedream

A block-based transformation algorithm is proposed for image security using a combination of image transformation and encryption techniques. This algorithm will be used as a pre-encryption transform to confuse the relationship between the original images and the generated ones. The generated (transformed) images are then fed to the Blowfish encryption algorithm. Correlation, histogram, and entropy have been used to measure the security level of the images.
Update : 2024-05-18 Size : 140288 Publisher : Bhanu

Blowfish配合單晶片的簡單編碼程式-Blowfish single-chip with a simple encoding program
Update : 2024-05-18 Size : 7168 Publisher : 陳奕甫

DL : 0
delphi 文件备份控件源码,类似于rar zip。本人常用其打包存放程序的资源、配置文件。-TArchiver the archiving is done with the pasZLib compression library, and the default encryption uses the Blowfish algorithm.TExtractor lets you extract archive of files made by TArchiver. Useful for a Self extracting archive. It uses the minimum of the VCL to be the as light as possible. (Default API)
Update : 2024-05-18 Size : 1140736 Publisher : c

Blowfish Algorithm is a Feistel Network, iterating a simple encryption function 16 times. The block size is 64 bits, and the key can be any length up to 448 bits. Although there is a complex initialization phase required before any encryption can take place, the actual encryption of data is very efficient on large microprocessors. Blowfish is a variable-length key block cipher. It is suitable for applications where the key does not change often, like a communications link or an automatic file encryptor. It is significantly faster than most encryption algorithms when implemented on 32-bit microprocessors with large data caches.
Update : 2024-05-18 Size : 51200 Publisher : prabhakaran

DL : 0
Encryption and Decryption of Bitmap Images via Blowfish
Update : 2024-05-18 Size : 861184 Publisher : amany

一个有效的BlowFish加密和解密算法,自己正在使用中!-An effective BlowFish encryption and decryption algorithms, that you are using the!
Update : 2024-05-18 Size : 34816 Publisher : ZLSH

DL : 0
Source Code of Blowfish
Update : 2024-05-18 Size : 47104 Publisher : shredder

DL : 0
java加密技术:除了DES,我们还知道有DESede(TripleDES,就是3DES)、AES、Blowfish、RC2、RC4(ARCFOUR)等多种对称加密方式,其实现方式大同小异,这里介绍对称加密的另一个算法——PBE-java encryption technology: In addition to DES, we also know DESede (TripleDES, that is, 3DES), AES, Blowfish, RC2, RC4 (ARCFOUR) and other symmetric encryption methods, the means to achieve similar, here' s another symmetric encryption algorithm--PBE
Update : 2024-05-18 Size : 10240 Publisher : gaoshan

DL : 0
Vim 7.3主要改进包括: 1.Vim 7.3支持在重新加载编辑内容时进行撤销操作功能。(不仅仅是编辑过程中可以撤销编辑,重新编译依然可以保存以往编辑记录实现撤销) 2.Vim 7.3采用了Blowfish加密算法加密交换文件 3.Vim 7.3增加了隐藏文本的功能 4.Vim 7.3增加了Lua接口文件的支持 5.Vim 7.3增加了对Python3接口的支持 6.Vim 7.3还包括大量原有功能的改进和bug修复 -Vim 7.3 Major improvements include: 1.Vim 7.3 support in re-loading content when editing undo function. (Not just the editing process to revoke the edit, recompile the past can still save the edited record to achieve withdrawal) 2.Vim 7.3 encrypted using Blowfish encryption algorithm to increase the swap file 3.Vim 7.3 hidden text function 4.Vim 7.3 increase Lua interface file support 5.Vim 7.3 adds support for Python3 6.Vim 7.3 interface also includes a large number of original features improvements and bug fixes
Update : 2024-05-18 Size : 9080832 Publisher : zk

DL : 0
enkripsi dekripsi vb applicationt
Update : 2024-05-18 Size : 56320 Publisher : praperor
« 1 2 ... 7 8 9 10 11 1213 14 15 16 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.