CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Crack Hack
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Crack Hack list
Sort by :
«
1
2
...
.00
.01
.02
.03
.04
1205
.06
.07
.08
.09
.10
...
1665
»
Caesar_demo
Downloaded:0
the source Caesar is a realization of a simple algorithm for the Console, is a demonstration program.
Update
: 2025-01-20
Size
: 3kb
Publisher
:
张华
Hill_encpyt_decrypt_system
Downloaded:0
the source of Hill simple algorithm to achieve, Compression packet contains crypt and decrypt two catalogs, respectively encryption and decryption.
Update
: 2025-01-20
Size
: 5kb
Publisher
:
张华
RSA_crypt_system
Downloaded:0
this source is the use of JAVA RSA public key cryptography algorithm example of a simple procedure.
Update
: 2025-01-20
Size
: 10kb
Publisher
:
张华
A5Encryption
Downloaded:0
A5 algorithm using encryption and decryption algorithms, A5 algorithm used LFSR flow of data encryption and decryption operations.
Update
: 2025-01-20
Size
: 55kb
Publisher
:
liudongxiao
IDEAEncryption
Downloaded:0
IDES text file encryption and decryption, the use of data to a 64, 128-key encryption.
Update
: 2025-01-20
Size
: 18kb
Publisher
:
liudongxiao
DES_Encryption
Downloaded:0
DES encryption and decryption of text files, using a method of encryption and decryption of encrypted data, a length of 64.
Update
: 2025-01-20
Size
: 63kb
Publisher
:
liudongxiao
3DES_Encryption
Downloaded:0
3DES algorithm is enhanced by DES algorithm, the use of 128-bit key length, CBC mode of use of a feedback mechanism password usage patterns.
Update
: 2025-01-20
Size
: 61kb
Publisher
:
liudongxiao
CBC_DESEncryption
Downloaded:0
use of a method of encryption and decryption of encrypted data, a length of 64. the use of the feedback mechanism to use a password.
Update
: 2025-01-20
Size
: 66kb
Publisher
:
liudongxiao
doublerandomphaseencryptionofbiologytrait
Downloaded:0
procedures for the image of encryption and hidden in the encryption process, the original image encryption into white noise, allow an attacker not declassified. This procedure only for academic exchanges.
Update
: 2025-01-20
Size
: 1kb
Publisher
:
肖海
imageattackandencryption
Downloaded:0
this procedure only for academic exchanges, if used for other commercial purposes, I have nothing to do.
Update
: 2025-01-20
Size
: 1kb
Publisher
:
肖海
des_c1
Downloaded:0
a classic DES encryption procedures, is worth learning and reference
Update
: 2025-01-20
Size
: 6kb
Publisher
:
kevin.liu
CrypTool_1_4_00
Downloaded:0
a very popular packet of cryptography tool s, it encloses the most common algorithm used and p rotocols
Update
: 2025-01-20
Size
: 59.27mb
Publisher
:
zhyu hu
«
1
2
...
.00
.01
.02
.03
.04
1205
.06
.07
.08
.09
.10
...
1665
»
CodeBus
is the largest source code store in internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.