CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Crack Hack
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Crack Hack list
Sort by :
«
1
2
...
.39
.40
.41
.42
.43
1244
.45
.46
.47
.48
.49
...
1665
»
TomCrypt
Downloaded:0
the compression package includes tom encryption functions and pdf descriptions and Rinick s ECC : Elliptic Curve asymmetric encryption key generator
Update
: 2025-01-19
Size
: 1.15mb
Publisher
:
TestAes
Downloaded:0
Aes Algorithm c achieve encryption and decryption process and the time required for testing, without extracting passwords
Update
: 2025-01-19
Size
: 1.15mb
Publisher
:
P-Pass
Downloaded:0
procedures want to know is how to achieve encryption and decryption of incorrect? So to download and end, simple, but not you hit me!
Update
: 2025-01-19
Size
: 159kb
Publisher
:
叶子
substitution-cipher
Downloaded:0
substitution cipher assistant . It Will display the ciphertext underneath the guessed plaintext.
Update
: 2025-01-19
Size
: 2kb
Publisher
:
連源
MD5_js
Downloaded:0
js MD5 algorithm in the realization jsp page for the encryption
Update
: 2025-01-19
Size
: 2kb
Publisher
:
wumingshi
Rail_Fence_Tecknique
Downloaded:0
simple columns encryption algorithm is relatively simple for everybody to use
Update
: 2025-01-19
Size
: 3kb
Publisher
:
he
keeloq_decode
Downloaded:0
keeloq software decoding process (from Taiwan on a website download and notes some gibberish. but not use).
Update
: 2025-01-19
Size
: 26kb
Publisher
:
zidaozhou
DES_encode
Downloaded:0
integrity of the DES encryption algorithm, c compile builder
Update
: 2025-01-19
Size
: 207kb
Publisher
:
zidaozhou
cryptography_matlab_codes
Downloaded:0
vigenere code declassified Matlab realized, build environment : Matlab
Update
: 2025-01-19
Size
: 17kb
Publisher
:
zidaozhou
AES
Downloaded:0
Road through this program, further deepening the understanding of AES, understand the modular design of the basic idea, programming time, a major task decomposition is very important. in light of the corresponding sub-ta
Update
: 2025-01-19
Size
: 3kb
Publisher
:
陈剑峰
DesLA
Downloaded:0
function : symmetric DES algorithm Safety Analysis-- linear analysis (ie eight S_Box linear analysis)
Update
: 2025-01-19
Size
: 3kb
Publisher
:
小布丁
VC_RSA
Downloaded:0
one, the basic tenets of RSA expressly group M and cipher block C, encryption and decryption process is as follows : C = POW (M, e) mod n = M POW (C, d) mod n = POW (POW (M, e), d) mod n = POW (M, e* d), which is an expo
Update
: 2025-01-19
Size
: 1.87mb
Publisher
:
«
1
2
...
.39
.40
.41
.42
.43
1244
.45
.46
.47
.48
.49
...
1665
»
CodeBus
is the largest source code store in internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.