搜索结果
找到约 601 项符合
private-key 的查询结果
数据结构 This is an implementation of double-array structure for representing trie, as proposed by Junichi A
This is an implementation of double-array structure for representing trie,
as proposed by Junichi Aoe [1].
Trie is a kind of digital search tree, an efficient indexing method with
O(1) time complexity for searching. Comparably as efficient as hashing,
trie also provides flexibility on incremental m ...
VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...
加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...
Linux/Unix编程 解决no pubkey问题脚本
解决no pubkey问题脚本,用于ubuntu添加key,直接运行addkey key值 后为key值
文件格式 XTHIDE is a GUI that allows the user to hide a text message in an image file. The user will be ask
XTHIDE is a GUI that allows the user to hide a text message in an image file.
The user will be asked for a key that will be used to both encode and decode the text into an image.
The key can be of length from 2 to 900 characters.
The encryption pattern for a key hell is not a subset of the encr ...
uCOS This Program Cotains Eeprom Read-write functions, 4 Bit LCD interface routines, Keyboard Interface w
This Program Cotains Eeprom Read-write functions, 4 Bit LCD interface routines, Keyboard Interface with normal Key Input to the 89C52 atmel Microcontroller.
Java编程 根据MAC地址生产序列号
根据MAC地址生产序列号,
改变char[] key 即可生成不同序列号
其他嵌入式/单片机内容 Program for implementing AES on 8051 based microcontrollers. SDCC is used as the C compiler. Microco
Program for implementing AES on 8051 based microcontrollers. SDCC is used as the C compiler. Microcontroller used is P89V51RD2. There are 2 programs included. One program will accept string via UART and accept key via a 4x4 keypad and display decrypted text on 16x2 LCD. The other program will accept ...
中间件编程 单总线多点测温系统
单总线多点测温系统,单总线它采用单根信号线既传输时钟又传输数据,而且数据传输是双向的它具有节省I/O 口线资源结构简单成本低廉便于总线扩展和
维护等诸多优点。本系统中所有的DS18B20都接在单片机的P1.1口上。用一个液晶屏显示,从单片机P3口接上8个开关,与右边的DS18B20
编号对应。当没有开关按下时屏幕显示"which NO ...
数据结构 very simple nonvisual Delphi component useful for shareware program developing. It uses crypted lic
very simple nonvisual Delphi component useful for shareware program developing.
It uses crypted license files containing information about exe file (size and crc), expired date and any additional information.
As TArtLicense uses RSA asymmetric algorithm and TArtLicense knows only decryption key, nob ...