代码搜索:Encryption
找到约 4,642 项符合「Encryption」的源代码
代码结果 4,642
www.eeworm.com/read/258259/11874308
man des.man
.TH DES 1
.SH NAME
des - encrypt or decrypt data using Data Encryption Standard
.SH SYNOPSIS
.B des
(
.B \-e
|
.B \-E
) | (
.B \-d
|
.B \-D
) | (
.B \-\fR[\fPcC\fR][\fPckname\fR]\fP
) |
[
.B \-b3hfs
www.eeworm.com/read/252679/12268192
cr readme.cr
_____________________________________________________________________________
This is Info-ZIP's README.CR for zcrypt291.zip, last updated 31 May 2006.
_____________________________________________
www.eeworm.com/read/222225/14700484
h tea.h
//Rijndael.h
#ifndef __TEA_H__
#define __TEA_H__
//Typical DISCLAIMER:
//The code in this project is Copyright (C) 2003 by George Anescu. You have the right to
//use and distribute the code
www.eeworm.com/read/121981/14727692
cryptcat readme.cryptcat
cryptcat = netcat + encryption
Cryptcat is the standard netcat enhanced with twofish encryption.
Twofish is courtesy of counterpane, and cryptix. We started with the
Java version of twofish f
www.eeworm.com/read/121978/14727792
cryptcat readme.cryptcat
cryptcat = netcat + encryption
Cryptcat is the standard netcat enhanced with twofish encryption.
Twofish is courtesy of counterpane, and cryptix. We started with the
Java version of twofish f
www.eeworm.com/read/115330/15017834
h sflcryp.h
/* -----------------------------------------------------------------
Name: sflcryp.h
Title: Encryption and decryption functions
Package: Standard Function Library
www.eeworm.com/read/114602/15046374
man des.man
.TH DES 1
.SH NAME
des - encrypt or decrypt data using Data Encryption Standard
.SH SYNOPSIS
.B des
(
.B \-e
|
.B \-E
) | (
.B \-d
|
.B \-D
) | (
.B \-\fR[\fPcC\fR][\fPckname\fR]\fP
)
www.eeworm.com/read/114188/15069943
htm 00000289.htm
BBS水木清华站∶精华区
BBS水木清华站∶精华区
发信人: linuxrat (叫我老鼠错不了), 信区: Linux &n
www.eeworm.com/read/211389/15181054
txt tech0002.txt
Tech Note 0002
How to avoid non-intrusive timing attacks with online computations
Tom St Denis
Introduction
------------
A timing attack is when an attacker can observe a side channel of the device
www.eeworm.com/read/472579/6870996
html 208-211.html
Smart Card Developer's Kit:Smart Cards and Security
Previous