Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .71 .72 .73 .74 .75 1276.77 .78 .79 .80 .81 ... 1665 »
Downloaded:0
Virginia (Vigenere) password to the password to raise the difficulty deciphering, people have invented a multi-table replacement passwords, or express a letter can be expressed as a number of secret alphabet, multi-table
Update : 2025-01-18 Size : 1kb Publisher : god

Downloaded:0
DES algorithm procedures can be used DOS, Windows, UNIX and LINUX as the platform.
Update : 2025-01-18 Size : 3kb Publisher : 董时舫

Downloaded:0
good code Hill, Hill is a classic encryption algorithms, encryption can transform line shape, followed again from close inverse transform. Key is the transformation matrix itself.
Update : 2025-01-18 Size : 2kb Publisher : 李军

Downloaded:0
VIGENERE French cryptologist, with his name out the password is a typical multi-table password! From his secret encryption can solve civilization faces phalanx!
Update : 2025-01-18 Size : 2kb Publisher : 李军

Downloaded:0
image encryption and decryption of paper, very good, valuable reference
Update : 2025-01-18 Size : 1.59mb Publisher : 朱强峰

Downloaded:0
This is a digital signature algorithm DSA! Borrowed from the others! To everyone's learning and raise!
Update : 2025-01-18 Size : 7kb Publisher : 宋志博

Downloaded:0
Crypto is a very powerful cryptography library, the main function of the whole, good uniformity basically cryptography needs of the main features can still find them. Crypto standard is written in C, learning C, cryptogr
Update : 2025-01-18 Size : 8.09mb Publisher : 冯军

Downloaded:0
achieved using DES encryption algorithm, but only against a plain text encrypted. My Contact erac_cn@126.com
Update : 2025-01-18 Size : 190kb Publisher : tOmMy

Downloaded:0
RSA encryption algorithm, interface operation, it is convenient to the contents of the documents for encryption, but in order to longer content encryption algorithm used in the sub-encryption tools. The algorithm steps a
Update : 2025-01-18 Size : 74kb Publisher : 何泽荣

Downloaded:0
RSA decryption algorithm lengthened section, the interface operation. Algorithm steps are as follows : 1. Read private key d and n, used for decryption. 2. EncText from reading a big secret of the text, and then the big
Update : 2025-01-18 Size : 33kb Publisher : 何泽荣

Downloaded:0
network information using encryption technology to achieve the e-mail transmission security, including encryption algorithm and the use mfc csmtp constitutes a category of email procedures
Update : 2025-01-18 Size : 1.9mb Publisher : pyt

Downloaded:1
gencoder is a simple php code, using base64 encryption algorithm php script for encryption and decryption
Update : 2025-01-18 Size : 1kb Publisher : 侯为
« 1 2 ... .71 .72 .73 .74 .75 1276.77 .78 .79 .80 .81 ... 1665 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.