Welcome![Sign In][Sign Up]
Location:
SourceCode OS program Crack Hack

Crack Hack List Page 1205

« 1 2 ... .00 .01 .02 .03 .04 1205.06 .07 .08 .09 .10 ... 1665 »

[Crack HackAES_128_192_256

Description: the procedure is standard AES key to achieve a simple, which can be achieved in the key length of 128 .192.256 three, just learning for the people of cryptography.
Platform: | Size: 477184 | Author: | Hits:

[Crack HackCaesar_demo

Description: the source Caesar is a realization of a simple algorithm for the Console, is a demonstration program.
Platform: | Size: 3072 | Author: 张华 | Hits:

[Crack HackHill_encpyt_decrypt_system

Description: the source of Hill simple algorithm to achieve, Compression packet contains crypt and decrypt two catalogs, respectively encryption and decryption.
Platform: | Size: 5120 | Author: 张华 | Hits:

[Crack HackRSA_crypt_system

Description: this source is the use of JAVA RSA public key cryptography algorithm example of a simple procedure.
Platform: | Size: 10240 | Author: 张华 | Hits:

[Crack HackA5Encryption

Description: A5 algorithm using encryption and decryption algorithms, A5 algorithm used LFSR flow of data encryption and decryption operations.
Platform: | Size: 56320 | Author: liudongxiao | Hits:

[Crack HackIDEAEncryption

Description: IDES text file encryption and decryption, the use of data to a 64, 128-key encryption.
Platform: | Size: 18432 | Author: liudongxiao | Hits:

[Crack HackDES_Encryption

Description: DES encryption and decryption of text files, using a method of encryption and decryption of encrypted data, a length of 64.
Platform: | Size: 64512 | Author: liudongxiao | Hits:

[Crack Hack3DES_Encryption

Description: 3DES algorithm is enhanced by DES algorithm, the use of 128-bit key length, CBC mode of use of a feedback mechanism password usage patterns.
Platform: | Size: 62464 | Author: liudongxiao | Hits:

[Crack HackCBC_DESEncryption

Description: use of a method of encryption and decryption of encrypted data, a length of 64. the use of the feedback mechanism to use a password.
Platform: | Size: 67584 | Author: liudongxiao | Hits:

[Crack Hackdoublerandomphaseencryptionofbiologytrait

Description: procedures for the image of encryption and hidden in the encryption process, the original image encryption into white noise, allow an attacker not declassified. This procedure only for academic exchanges.
Platform: | Size: 1024 | Author: 肖海 | Hits:

[Crack Hackimageattackandencryption

Description: this procedure only for academic exchanges, if used for other commercial purposes, I have nothing to do.
Platform: | Size: 1024 | Author: 肖海 | Hits:

[Crack Hackdes_c1

Description: a classic DES encryption procedures, is worth learning and reference
Platform: | Size: 6144 | Author: kevin.liu | Hits:
« 1 2 ... .00 .01 .02 .03 .04 1205.06 .07 .08 .09 .10 ... 1665 »

CodeBus www.codebus.net