CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Crack Hack
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Crack Hack list
Sort by :
«
1
2
...
.38
.39
.40
.41
.42
143
.44
.45
.46
.47
.48
...
1665
»
HASH
Downloaded:0
hash verilog rtl
Update
: 2025-01-10
Size
: 6kb
Publisher
:
zhaop
AES
Downloaded:0
aes verilog rtl
Update
: 2025-01-10
Size
: 211kb
Publisher
:
zhaop
pka_engine
Downloaded:0
rsa ecc rtl and sim
Update
: 2025-01-10
Size
: 7.62mb
Publisher
:
zhaop
sm4_length_issue
Downloaded:0
SM4 Java
Update
: 2025-01-10
Size
: 1.56mb
Publisher
:
程序猿
Crc
Downloaded:0
CRC generation and validation, including 16, 8, 32 bits
Update
: 2025-01-10
Size
: 4kb
Publisher
:
cjf
testSCRATE
Downloaded:0
Asymmetric encryption, RSA algorithm, for example, data encryption and decryption, a complete algorithm. This program is just a simple example. Does not include the network environment.
Update
: 2025-01-10
Size
: 328kb
Publisher
:
龙小文
fingerprint-overview
Downloaded:0
Fingerprint Identification is the method of identification using the impressions made by the minute ridge formations or patterns found on the fingertips. No two persons have exactly the same arrangement of ridge patterns
Update
: 2025-01-10
Size
: 1.65mb
Publisher
:
Archanadevi
AESClass4VB6
Downloaded:0
AES加密類別FOR Visual Basic 6
Update
: 2025-01-10
Size
: 22kb
Publisher
:
jones
DTproTest
Downloaded:0
DTproTest example DTproTest example
Update
: 2025-01-10
Size
: 6.42mb
Publisher
:
敏敏
2D-logistic-image-encrytion
Downloaded:0
In this matlab test,we use the chastic s excellent properties of unpredictability, ergodicity and sensitivity to their parameters and initial values, chaotic maps are widely used in security applications. In this paper,
Update
: 2025-01-10
Size
: 4.63mb
Publisher
:
Knight
DecodeStrategy
Downloaded:0
This code decryption achieve three strategies, including sequential search method, binary search method, and the Fibonacci search method
Update
: 2025-01-10
Size
: 10.47mb
Publisher
:
chen
Downloaded:1
Chen Chao use chaotic maps can produce super-chaotic sequence, this sequence has randomness, unpredictability of the wide range of applications and images, video encryption field
Update
: 2025-01-10
Size
: 1kb
Publisher
:
薛薛
«
1
2
...
.38
.39
.40
.41
.42
143
.44
.45
.46
.47
.48
...
1665
»
CodeBus
is the largest source code store in internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.