Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .05 .06 .07 .08 .09 1410.11 .12 .13 .14 .15 ... 1665 »
Downloaded:0
Substitution cipher does not change the principle is expressly characters, only the characters in the explicit change in order to achieve explicit information encryption. Password replacement is also called transposition
Update : 2008-10-13 Size : 9.88kb Publisher : AnySand

Downloaded:0
MD5 algorithm description (abbreviated). The design of a simulation system security log user interface, using MD5 algorithm users log on password security authentication. Analog interface requirements at least a register
Update : 2008-10-13 Size : 6.62kb Publisher : AnySand

Downloaded:0
Wireless sensor key management algorithm, polynomial-based key pre-distribution algorithm, the use of RC5 encryption algorithm
Update : 2008-10-13 Size : 43.64kb Publisher : bidyy

Downloaded:0
The main achievement of this process the DES encryption algorithm is divided into file encryption and string encryption
Update : 2008-10-13 Size : 79.96kb Publisher : 丁涛

Downloaded:1
Elliptic Curve Cryptography procedures and complete encryption and decryption procedures (including explicit embedded processing).
Update : 2008-10-13 Size : 8.86kb Publisher : 周巍

Downloaded:0
Elliptic curve encryption process, the article partition encryption, the realization of the entire article, encryption and decryption.
Update : 2008-10-13 Size : 13.22kb Publisher : 周巍

Downloaded:0
Rijndael.rar: by VS2005 debugging MFC under WIN32 platform applications, the use of Rijndael method of any form of computer files increases, decryption, with notes for beginners to learn.
Update : 2008-10-13 Size : 3.38mb Publisher : 唐进

Downloaded:0
RSA encryption algorithm, can be absolute, the pro-test RSA encryption algorithm, can be absolute, the pro-test
Update : 2008-10-13 Size : 3.45kb Publisher : 海旭

Downloaded:0
Classical cryptography, a very good use, very convenient. Really good, and really very easy
Update : 2008-10-13 Size : 13.25kb Publisher : 徐雄博

Downloaded:0
des algorithm, very classic, very convenient, very good, and good strong
Update : 2008-10-13 Size : 25.49kb Publisher : 徐雄博

Downloaded:0
Text to achieve encryption and decryption of delphi source, you can modify the free dissemination of
Update : 2008-10-13 Size : 195.69kb Publisher : huxhang

Downloaded:0
1. Analysis of ECB mode and CBC mode of encryption process. 2. Used programming language programming to realize the algorithm process. 3. Enter explicitly: I do like this book encryption algorithm E: XOR ⊕, key for crypt
Update : 2008-10-13 Size : 2.51kb Publisher : 陈觅尘
« 1 2 ... .05 .06 .07 .08 .09 1410.11 .12 .13 .14 .15 ... 1665 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.