Welcome![Sign In][Sign Up]
Location:
SourceCode OS program Crack Hack

Crack Hack List Page 1358

« 1 2 ... .53 .54 .55 .56 .57 1358.59 .60 .61 .62 .63 ... 1665 »

[Crack HackUDES

Description: DES algorithm procedures can be used DOS, Windows, UNIX and LINUX as the platform.
Platform: | Size: 2918 | Author: 董时舫 | Hits:

[Crack Hack希尔

Description: good code Hill, Hill is a classic encryption algorithms, encryption can transform line shape, followed again from close inverse transform. Key is the transformation matrix itself.
Platform: | Size: 2514 | Author: 李军 | Hits:

[Crack Hack维吉利亚

Description: VIGENERE French cryptologist, with his name out the password is a typical multi-table password! From his secret encryption can solve civilization faces phalanx!
Platform: | Size: 2199 | Author: 李军 | Hits:

[Crack Hack范文other

Description: image encryption and decryption of paper, very good, valuable reference
Platform: | Size: 1668058 | Author: 朱强峰 | Hits:

[Crack Hackdsa2

Description: This is a digital signature algorithm DSA! Borrowed from the others! To everyone's learning and raise!
Platform: | Size: 7836 | Author: 宋志博 | Hits:

[Crack Hackcryptopp504win32

Description: Crypto is a very powerful cryptography library, the main function of the whole, good uniformity basically cryptography needs of the main features can still find them. Crypto standard is written in C, learning C, cryptogr
Platform: | Size: 8485990 | Author: 冯军 | Hits:

[Crack HackDES文件加密模块

Description: achieved using DES encryption algorithm, but only against a plain text encrypted. My Contact erac_cn@126.com
Platform: | Size: 195244 | Author: 刘毅 | Hits:

[Crack HackRSA加长分段加密

Description: RSA encryption algorithm, interface operation, it is convenient to the contents of the documents for encryption, but in order to longer content encryption algorithm used in the sub-encryption tools. The algorithm steps a
Platform: | Size: 75988 | Author: 何泽荣 | Hits:

[Crack HackRSA加长分段解密

Description: RSA decryption algorithm lengthened section, the interface operation. Algorithm steps are as follows : 1. Read private key d and n, used for decryption. 2. EncText from reading a big secret of the text, and then the big
Platform: | Size: 33550 | Author: 何泽荣 | Hits:

[Crack Hack加密电子邮件

Description: network information using encryption technology to achieve the e-mail transmission security, including encryption algorithm and the use mfc csmtp constitutes a category of email procedures
Platform: | Size: 42228 | Author: pyt | Hits:

[Crack Hackgencoder-1[1].0

Description: gencoder is a simple php code, using base64 encryption algorithm php script for encryption and decryption
Platform: | Size: 1548 | Author: 侯为 | Hits:

[Crack Hackrijndael-Aes

Description: this is a standard encryption algorithm AEs, the largest encrypted traffic reached 70M/s. Including the main program and the first document
Platform: | Size: 3311 | Author: 王王 | Hits:
« 1 2 ... .53 .54 .55 .56 .57 1358.59 .60 .61 .62 .63 ... 1665 »

CodeBus www.codebus.net