Welcome![Sign In][Sign Up]
Location:
SourceCode OS program Crack Hack

Crack Hack List Page 1082

« 1 2 ... .77 .78 .79 .80 .81 1082.83 .84 .85 .86 .87 ... 1665 »

[Crack HackASMencryptionsourcecode

Description: Use
Platform: | Size: 1024 | Author: 艾雪辉 | Hits:

[Crack Hackmimaxue

Description: This is based on several programming cryptography, it is the foundation, but it is commonly used in cryptography to the
Platform: | Size: 1559552 | Author: luo_hongbin | Hits:

[Crack HackTDES

Description: Written using C language TDES algorithm, which has detailed notes, and they hope to be helpful to everyone.
Platform: | Size: 5120 | Author: dragon | Hits:

[Crack Hackjiami

Description: Using matlab realize image encryption procedures, the speed is still possible that some slow
Platform: | Size: 1024 | Author: 223 | Hits:

[Crack HackAES

Description: This is the source code for encryption using the latest AES algorithm. AES algorithm is also called Rijndael algorithm. AES algorithm is recommended for non-classified use by the National Institute of Standards and Techn
Platform: | Size: 8192 | Author: derek jeter | Hits:

[Crack Hackjaimi

Description: Information Security RSA encryption and decryption with the DES algorithm, using the Visual C++ MFC
Platform: | Size: 542720 | Author: wen | Hits:

[Crack Hackpb_MD5

Description: Powerbasic using MD5 encryption!
Platform: | Size: 3072 | Author: 镙丝丁 | Hits:

[Crack Hackrsaref

Description: RSA Laborary private collection of the relevant encryption library provides the most basic DES/RSA cryptographic algorithm, such as source code.
Platform: | Size: 102400 | Author: Robin | Hits:

[Crack Hackx917generator

Description: Use of ANSI X9.17 standard simulation of a pseudo-random number generator, called the kernel encryption algorithm 3DES algorithm, in accordance with the standard requirements to produce 64-bit pseudo-random number and 64
Platform: | Size: 192512 | Author: wildkaede | Hits:

[Crack HackHill

Description: Hill encryption algorithm the basic idea is to express the letter l a linear transformation through them is converted to k-secret alphabet. Off to do a secret as long as the inverse transform it. Key is the transformatio
Platform: | Size: 143360 | Author: wildkaede | Hits:

[Crack HackDES

Description: Des Algorithm is a standard symmetric encryption algorithm, and its essence is clear after a series of complex changes in law, the general in the circumstances I do not know the password should be difficult to restore it
Platform: | Size: 180224 | Author: wildkaede | Hits:

[Crack HackSHA512

Description: The algorithm input is less than the maximum length of 2128-bit message string, the output is 512-bit message digest, enter the message to 1024-bit group as a unit for processing. Realistic simulation of the SHA512 hash
Platform: | Size: 68608 | Author: wildkaede | Hits:
« 1 2 ... .77 .78 .79 .80 .81 1082.83 .84 .85 .86 .87 ... 1665 »

CodeBus www.codebus.net