Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - encryption
Search - encryption - List
用U盘作为USB狗加密office文件 U disk encryption as a USB dog office files-U disk encryption as a USB dog office files
Update : 2024-05-02 Size : 61440 Publisher : wolf

DL : 1
PB9自己写的加密解密demo包括密匙软件使用时间的解析判断-PB9 to write their own encryption and decryption demo including the key software to use the time to determine the use of time
Update : 2024-05-02 Size : 141312 Publisher : 雨天

STM32_AES加密 的实现方法实例,个人验证成功有效。-STM32 AES encryption
Update : 2024-05-02 Size : 2117632 Publisher : 王伟

Source code to recover P and Q encryption parameters for rsa
Update : 2024-05-02 Size : 4096 Publisher : concrete

经典的凯撒加密解密算法,用java实现,可移植性强,欢迎各位童鞋指正交流-Classic Caesar encryption and decryption algorithms, implemented in java, portability, welcome correction exchanges shoes
Update : 2024-05-02 Size : 1024 Publisher : Ami

Advaced Encryption Standard matlab code. Advaced Encryption Standard matlab code. Advaced Encryption Standard matlab code.-Advaced Encryption Standard matlab code. Advaced Encryption Standard matlab code. Advaced Encryption Standard matlab code. Advaced Encryption Standard matlab code. Advaced Encryption Standard matlab code.
Update : 2024-05-02 Size : 2097152 Publisher : Aswathy Mohan

A Survey on Image Encryption and Decryption using Blowfish & Watermarking
Update : 2024-05-02 Size : 325632 Publisher : ashraf

Data Encryption Standard Algorithm with time variable Key permutations
Update : 2024-05-02 Size : 13312 Publisher : SOUFIANE

完整的图像加密算法以及对此算法加密结果的性能分析:像素之间相关性,图像的信息熵,以及NPCR,UACI-completely figure encryption scheme and corespond result analysis
Update : 2024-05-02 Size : 2048 Publisher : 曹纯

基于干涉原理运用多重密钥加密,属于光学加密与加密的体系-An encryption method with multiple encrypted keys based on interference principle
Update : 2024-05-02 Size : 544768 Publisher : 常国军

DL : 0
VHDL Encryption/ Decryption Algorithm
Update : 2024-05-02 Size : 2383872 Publisher : WafaMahdhi

读写加密的二进制文件,vb6.0 源码文件-Read and write binary files, and encryption, VB6.0 source code documentation
Update : 2024-05-02 Size : 14336 Publisher : xbj

安卓 字符串加密 安卓通过JNI调用C语言进行加密,实现加固 -Andrews string encryption JAVA.
Update : 2024-05-02 Size : 1174528 Publisher : qiruixvan

A New Chaotic Algorithm for Image Encryption
Update : 2024-05-02 Size : 637952 Publisher : ramana

IMAGE DATA ENCRYPTION
Update : 2024-05-02 Size : 261120 Publisher : engr

WAVELET BASED IMAGE ENCRYPTION
Update : 2024-05-02 Size : 743424 Publisher : engr

AES joint encryption
Update : 2024-05-02 Size : 245760 Publisher : Dhanu

DL : 0
SHA-1 hashing and DES encryption for LSB watermarking
Update : 2024-05-02 Size : 1145856 Publisher : kartino

DL : 0
椭圆规则的加密,适合初学者与科研研究。自学时写的代码。-Elliptical rules of encryption, suitable for beginners and research. Self-study to write the code
Update : 2024-05-02 Size : 7369728 Publisher : 李晓

DL : 0
code for adavance encryption standard for security system by using matlab
Update : 2024-05-02 Size : 160768 Publisher : venky
« 1 2 ... 45 46 47 48 49 50»
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.