jackfromeast / DES_algorithmLinks
使用DES加密算法通过四种操作模式(ECB\CBC\CFB\OFB)实现对文件的加密;Using DES algorithm encode files through four different patterns
☆10Updated 5 years ago
Alternatives and similar repositories for DES_algorithm
Users that are interested in DES_algorithm are comparing it to the libraries listed below
Sorting:
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆54Updated 4 years ago
- ☆12Updated 3 months ago
- 主要是自己看过的一些论文,同时做了对应的思维导图,以供大家参考学习。☆14Updated 3 years ago
- https://github.com/SySeVR/SySeVR 项目的所需依赖和部分修改后的代码☆24Updated 5 years ago
- ☆50Updated 7 years ago
- VulDeePecker algorithm implemented in Python☆113Updated 6 years ago
- ☆46Updated 2 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆344Updated 5 years ago
- ☆27Updated last year
- FUNDED is a novel learning framework for building vulnerability detection models.☆129Updated 2 years ago
- ☆349Updated last year
- ☆42Updated 3 years ago
- ☆11Updated 3 years ago
- ☆102Updated last year
- A cms system for Sichuan University CTF Association☆10Updated 5 years ago
- software defect prediction☆11Updated 3 years ago
- 用于应用密码学课程课程实践,编写一个发送端程序和一个接收端程序,接收端要完成对消息的 验证和解密。 用DES的ECB模式完成对信件内容的加密。 用RSA对上面的对称密钥进行加密,实现会话密钥交换。☆17Updated 6 years ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆219Updated last year
- Awesome Large Language Models for Vulnerability Detection☆362Updated last week
- 基于图神经网络的切片级漏洞检测及解释方法☆45Updated last year
- ☆13Updated 3 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 3 years ago
- IVA-Xception model which can achieve high performance in identifying multiple birds from overlapping bird sounds recordings based on IVA …☆16Updated 4 years ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Updated 5 years ago
- ☆27Updated last year
- utools插件: 快速开启虚拟机☆15Updated 3 years ago
- Data Mining for Cybersecurity☆78Updated 3 years ago
- 西湖论剑AI大数据安全分析赛 加密恶意流量检测赛道初赛第一名,决赛第二名方案☆22Updated 4 years ago
- ☆16Updated last year
- the rhg robot for ichunqiu 2018☆22Updated 7 years ago