搜索结果

找到约 142 项符合 Encryption 的查询结果

加密解密 A paper on the Rijndael encryption/decryption algorithm (now known as the AES standard) written by t

A paper on the Rijndael encryption/decryption algorithm (now known as the AES standard) written by the authors.
https://www.eeworm.com/dl/519/484586.html
下载: 172
查看: 1031

加密解密 A public-domain example implementation of the AES (Rijndael) encryption algorithm.

A public-domain example implementation of the AES (Rijndael) encryption algorithm.
https://www.eeworm.com/dl/519/484587.html
下载: 137
查看: 1057

Delphi控件源码 Encryption tool for delphi 2007. Conatain: Blowfish, MD5...

Encryption tool for delphi 2007. Conatain: Blowfish, MD5...
https://www.eeworm.com/dl/666/485164.html
下载: 177
查看: 1103

Delphi控件源码 Its a encryption tool for delphi 7. Its can encrypt with blowfish, md5, base64...

Its a encryption tool for delphi 7. Its can encrypt with blowfish, md5, base64...
https://www.eeworm.com/dl/666/485166.html
下载: 69
查看: 1046

书籍源码 Tiny Encryption Algorithm for secure communication.

Tiny Encryption Algorithm for secure communication.
https://www.eeworm.com/dl/532/487861.html
下载: 135
查看: 1033

加密解密 Application to generate Diffie-Hellman algorith encryption

Application to generate Diffie-Hellman algorith encryption
https://www.eeworm.com/dl/519/491647.html
下载: 130
查看: 1071

驱动编程 File System Filter Driver Example Code.. File Encryption Sample ..

File System Filter Driver Example Code.. File Encryption Sample ..
https://www.eeworm.com/dl/618/494124.html
下载: 147
查看: 1067

学术论文 MPEG2图像加密的FPGA实现

本论文讨论的是如何对符合DVB-T标准的数字图像无线监控系统中的MPEG2图像实现底层硬件的实时加/解密.数字图像无线监控系统是某公司研发的符合DVB-T标准的实时图像语音无线传输系统,通过对实时采集的图像等信息的发射与接收实现对远程现场的无线监控.为了保证图像数据在传输中的保密性,设计了基于FPGA的实时MPEG2图像加/解密 ...
https://www.eeworm.com/dl/514/11835.html
下载: 99
查看: 1067

加密解密 STM32 ID加密算法

读取STM32芯片内部唯一的标识,用于加密等区别其他芯片的操作,有完整注释,测试通过-STM32 chip to read a unique identifier for the encryption and other differences other chip operation, with complete notes, test
https://www.eeworm.com/dl/519/17019.html
下载: 82
查看: 1403

工控技术 工业系统安全问题和解决办法

Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCA ...
https://www.eeworm.com/dl/569/40930.html
下载: 36
查看: 1058