Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - caesar
Search - caesar - List
DL : 0
这个是个凯撒密码,老师给的,我得找个新的,你行不行啊-This is a Caesar cipher, the teacher gave, I have to find new, you okay ah
Update : 2024-05-05 Size : 246784 Publisher : tige

Caesar coder and decoder. Performs easy substitution cipher encryption and automatic decryption when key is unknown. Frequency of letters in common written English is used to decrypt.
Update : 2024-05-05 Size : 4096 Publisher : j123b567

DL : 0
Caesar加密算法的代码实现,Caesar加密算法是信息安全中一个非常重要和基础算法。-Caesar encryption algorithm code to achieve, Caesar encryption algorithm is a very important information security and basic algorithms.
Update : 2024-05-05 Size : 2048 Publisher : 阡陌

DL : 0
Caesar Encryption Program
Update : 2024-05-05 Size : 44032 Publisher : Jerry

DL : 0
Caesar Cipher Encryption Coding
Update : 2024-05-05 Size : 1024 Publisher : kumar

DL : 0
caesar加密算法,可用于简单加密或实验-encryption algorithm
Update : 2024-05-05 Size : 1024 Publisher : jeson

DL : 0
In cryptography, a Caesar cipher, also known as a Caesar s cipher, the shift cipher, Caesar s code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so on. The method is named after Julius Caesar, who used it to communicate with his generals. The encryption step performed by a Caesar cipher is often incorporated as part of more complex schemes, such as the Vigenà ¨re cipher, and still has modern application in the ROT13 system. As with all single alphabet substitution ciphers, the Caesar cipher is easily broken and in practice offers essentially no communication security. - In cryptography, a Caesar cipher, also known as a Caesar s cipher, the shift cipher, Caesar s code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so on. The method is named after Julius Caesar, who used it to communicate with his generals. The encryption step performed by a Caesar cipher is often incorporated as part of more complex schemes, such as the Vigenà ¨re cipher, and still has modern application in the ROT13 system. As with all single alphabet substitution ciphers, the Caesar cipher is easily broken and in practice offers essentially no communication security.
Update : 2024-05-05 Size : 1024 Publisher : adisbega

使用Visual Basic实现个人专属的密码加密器-Caesar Cipher with VB
Update : 2024-05-05 Size : 1024 Publisher : 李宜儒

DL : 0
java实现的Caesar移位密码,可以实现加密和解密功能!-java implementation of the Caesar shift passwords, encryption and decryption functions can be achieved!
Update : 2024-05-05 Size : 1024 Publisher : 李国华

DL : 0
凯撒密码是一种非常古老的加密方法,相传当年凯撒大地行军打仗时为了保证自己的命令不被敌军知道,就使用这种特殊的方法进行通信,以确保信息传递的安全。他的原理很简单,说到底就是字母于字母之间的替换。-Caesar is a very old password encryption method, traditionally the year when Caesar earth march to war in order to ensure their orders are not the enemy Army know, to use this particular method of communication to ensure the security of information transfer. His principle is very simple, in the final analysis to Between letters in the alphabet is replaced.
Update : 2024-05-05 Size : 1024 Publisher : Aldo

DL : 0
密码学中的凯撒密码加解密程序,用C语言实现。-Cryptography Caesar password encryption and decryption program, with the C language.
Update : 2024-05-05 Size : 169984 Publisher : 易盼

caesar cipher code in java..very helpfu-caesar cipher code in java..very helpfull
Update : 2024-05-05 Size : 2048 Publisher : gorave

DL : 0
取代式密码的存在,已经超过2500年 以上,最早利 用的范例 是在西元600年 左右,内容是以颠倒的希伯來 文构成的。凯萨大帝(Julius Caesar)也曾经使用称为Caesar密码法。方法为将每个字母用其后的第三个字母來 取代。-Replace passwords existence, has more than 2,500 years or more, the first example is using a range of about the year 600 AD, the contents of the text is upside-down Heber future composition. Great Caesar (Julius Caesar) has also been known as the Caesar cipher using the method. Method is used then each letter is replaced by the third letter.
Update : 2024-05-05 Size : 1024 Publisher : Aerio76

DL : 0
凯撒密码,通过明文移位实现加解密.解密时要注意当密钥太大时,可能引起数组下标为负导致程序错误。-Caesar passwords, encryption and decryption through the clear shift to achieve. Decrypt should pay attention when the key is too large, may cause negative array index errors cause the program.
Update : 2024-05-05 Size : 1024 Publisher : 路过

DL : 0
matlab code for caesar
Update : 2024-05-05 Size : 2048 Publisher : mina

DL : 0
this program is to define caesar cipher in visual basic programming
Update : 2024-05-05 Size : 11264 Publisher : tmmam

DL : 0
caesar encription in c-caesar encription in c++
Update : 2024-05-05 Size : 11264 Publisher : sanam

DL : 0
凯撒密码作为一种最为古老的对称加密体制,在古罗马的时候都已经很流行,他的基本思想是:通过把字母移动一定的位数来实现加密和解密。例如,如果密匙是把明文字母的位数向后移动三位,那么明文字母B就变成了密文的E,依次类推,X将变成A,Y变成B,Z变成C,由此可见,位数就是凯撒密码加密和解密的密钥。个人原创。-Caesar password as one of the most ancient symmetric encryption system in ancient Rome have been very popular, his basic idea is: by the letters move a certain number of bits to achieve encryption and decryption. For example, if the key is the number of bits of plaintext letters backward move three, the plaintext letter B into a ciphertext E, and so on, X will become Y-become a B,, and Z becomes C Thus, the median is the Caesar cipher encryption and decryption keys. Personal originality.
Update : 2024-05-05 Size : 1024 Publisher : zhubei

Caesar encryption and decryption matlab code
Update : 2024-05-05 Size : 1024 Publisher : zahiduowciit

DL : 0
Encryp-Decrypt using caesar technique
Update : 2024-05-05 Size : 185344 Publisher : dante
« 1 2 3 45 6 7 8 9 10 ... 20 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.