代码搜索:cryptography
找到约 2,420 项符合「cryptography」的源代码
代码结果 2,420
www.eeworm.com/read/138382/13238904
htm learn about windows cryptography.htm
AspEncrypt.com - Learn about Windows Cryptog
www.eeworm.com/read/479641/6689570
chm cryptography in c and c++ (2001).chm
www.eeworm.com/read/405810/11456593
mht dojox cryptography the dojo toolkit.mht
From:
Subject: DojoX Cryptography | The Dojo Toolkit
Date: Sun, 2 Dec 2007 16:37:41 +0800
MIME-Version: 1.0
Content-Type: multipart/related;
type="text/html";
www.eeworm.com/read/105943/15652954
url cryptography, encryption and stenography - good.url
[DEFAULT]
BASEURL=http://www.infosyssec.org/infosyssec/cry2.htm
[InternetShortcut]
URL=http://www.infosyssec.org/infosyssec/cry2.htm
Modified=00D5863267ACC00161
www.eeworm.com/read/359573/10136550
html 25-10.html
APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Politics
www.eeworm.com/read/279570/10419040
txt 微软提供的加密方法.txt
一下是一些微软提供的名字空间,详细说明见MSDN。
System.Security.Cryptography
www.eeworm.com/read/347320/11674343
txt 说明.txt
Applied Crypto++: Block Ciphers
Crypto++ offers over 25 Block Ciphers, ranging from AES to XTEA. Modern block ciphers require the choice of an algorithm, mode, feedback size, padding, and sometimes
www.eeworm.com/read/376273/9322234
pdf cryptography, c - applied cryptography 2nd edition protocols, algorthms, and source code in c.pdf
www.eeworm.com/read/359573/10136562
html 25-06.html
APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Politics
www.eeworm.com/read/274262/10879650
txt abstract.txt
The DES example is taken from the book "Applied Cryptography"
by Bruce Schneier. It is adapted for the Keil C51-Compiler.
The example code is not optimized for code or data space and
shows the pr