代码搜索:Encryption
找到约 4,642 项符合「Encryption」的源代码
代码结果 4,642
www.eeworm.com/read/112400/15487817
txt rfc1115.txt
Network Working Group J. Linn
Request for Comments: 1115 DEC
www.eeworm.com/read/112400/15488071
txt rfc2420.txt
Network Working Group H. Kummert
Request for Comments: 2420 Nentec GmbH
Category: Standards Track
www.eeworm.com/read/109909/15545873
txt dlock.txt
DLOCK.TXT -- DOCUMENTATION FOR DLOCK.EXE AND ITS SOURCE FILES
INTRODUCTION
DLOCK is a Data LOCK program that uses the Diamond encryption algorithm. It
also tests the correct implementation of the
www.eeworm.com/read/109907/15545911
txt dlock.txt
DLOCK.TXT -- DOCUMENTATION FOR DLOCK.EXE AND ITS SOURCE FILES
INTRODUCTION
DLOCK is a Data LOCK program that uses the Diamond encryption algorithm. It
also tests the correct implementation o
www.eeworm.com/read/106679/15627029
txt rfc1984.txt
Network Working Group IAB
Request for Comments: 1984 IESG
Category: Informational
www.eeworm.com/read/106679/15628566
txt rfc2773.txt
Network Working Group R. Housley
Request for Comments: 2773 P. Yee
Updates: 959
www.eeworm.com/read/106679/15629008
txt rfc1115.txt
Network Working Group J. Linn
Request for Comments: 1115 DEC
www.eeworm.com/read/106679/15629311
txt rfc2420.txt
Network Working Group H. Kummert
Request for Comments: 2420 Nentec GmbH
Category: Standards Track
www.eeworm.com/read/106371/15638585
escrow
VOL. 58, No. 145
DEPARTMENT OF COMMERCE (DOC)
National Institute of Standards and Technology (NIST)
Docket No. 930
www.eeworm.com/read/216674/14997948
py __init__.py
"""Secret-key encryption algorithms.
Secret-key encryption algorithms transform plaintext in some way that
is dependent on a key, producing ciphertext. This transformation can
easily be reversed, if