Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .17 .18 .19 .20 .21 1222.23 .24 .25 .26 .27 ... 1665 »
Downloaded:0
Orangk'aes This is an encryption algorithm that can be a general text encryption can also be used for image encryption, is a lot of people using the algorithm.
Update : 2025-01-20 Size : 2kb Publisher : 方泽栋

Downloaded:0
This is a rsa encryption procedures, encryption general text files, Digital signatures for a very important application, the images also can be used for encryption
Update : 2025-01-20 Size : 1kb Publisher : 方泽栋

Downloaded:0
This is a triple des encryption procedures, encryption general text files and image files, Among them were four model encryption procedures can be achieved under vc
Update : 2025-01-20 Size : 1kb Publisher : 方泽栋

Downloaded:0
the md5 hash algorithm for general text and documents can be conducted efficiently, 128 have the hash value
Update : 2025-01-20 Size : 3kb Publisher : 方泽栋

Downloaded:0
in vb under the encryption procedure, the realization of the text encryption and file encryption, But many of the algorithms have been decoded before.
Update : 2025-01-20 Size : 2.33mb Publisher : 方泽栋

Downloaded:0
with C#. Net development. On the company website prospects and the background. Yes, oh. Contribute to learning.
Update : 2025-01-20 Size : 12.73mb Publisher : guolei

Downloaded:0
optimization algorithm by twofish, twofish want to learn the passwords should not be missed
Update : 2025-01-20 Size : 13kb Publisher : andyeric

Downloaded:0
a prepared using vc Orangk'aes algorithm, containing 128,192,256 length of the three key
Update : 2025-01-20 Size : 92kb Publisher : zhangyini

Downloaded:0
des do with the dll, the asp can be used also in other projects to use.
Update : 2025-01-20 Size : 22kb Publisher : sunnf

Downloaded:0
the C language des encryption algorithms, encryption software can be used various means, including the the procedure itself can be embedded
Update : 2025-01-20 Size : 4kb Publisher : luojun

Downloaded:0
use of the Java language DES encryption and decryption, can sneak into other source, However, to ensure integrity of documents
Update : 2025-01-20 Size : 20kb Publisher : luojun

Downloaded:0
LOKI algorithm : LOKI89, encryption and decryption algorithm LOKI91
Update : 2025-01-20 Size : 24kb Publisher : 熊光安
« 1 2 ... .17 .18 .19 .20 .21 1222.23 .24 .25 .26 .27 ... 1665 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.