CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Crack Hack
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Crack Hack list
Sort by :
«
1
2
...
.42
.43
.44
.45
.46
1447
.48
.49
.50
.51
.52
...
1665
»
RijndaelTest
Downloaded:0
This RIJNDAEL algorithm is used to produce the ciphertext sequence JAVA algorithm, according to my need to write, if you want to use it, as long as the change in the main function will be under the
Update
: 2008-10-13
Size
: 5.27kb
Publisher
:
李锋
BitmapToFile
Downloaded:0
An example of encryption, and hope to image processing to help to everyone
Update
: 2008-10-13
Size
: 1.2mb
Publisher
:
宁梓淯
3DES
Downloaded:0
3DES encryption and decryption algorithms. The algorithm through the compiler can be used directly with the API, as a considerable convenience.
Update
: 2008-10-13
Size
: 34.12kb
Publisher
:
zuiwengoo
MyDiary
Downloaded:1
Powerful notebook, can achieve a lot of features, debugging through
Update
: 2008-10-13
Size
: 1.37mb
Publisher
:
fsdaf
encode
Downloaded:0
C# Write the encryption and decryption procedures, can quickly complete the encryption and decryption
Update
: 2008-10-13
Size
: 1.18kb
Publisher
:
fsdaf
zcrc500
Downloaded:0
This source Reader source as an indispensable part. For beginners to read
Update
: 2008-10-13
Size
: 1.8kb
Publisher
:
彭飞
3des
Downloaded:0
3DES encryption and decryption algorithm of a c++ Achieve. Network can use string encryption.
Update
: 2008-10-13
Size
: 6.15kb
Publisher
:
chenchen
VeriFile_sha256
Downloaded:0
sha256 encryption algorithm, a vc++ achieve. Network can use string encryption.
Update
: 2008-10-13
Size
: 89.92kb
Publisher
:
chenchen
jmjm.ZIP
Downloaded:0
A sample algorithm for encryption and decryption of a Vc++ Achieve. Network can use string encryption.
Update
: 2008-10-13
Size
: 22.83kb
Publisher
:
chenchen
aa
Downloaded:0
Caesar the process of password, and then matching the letters to replace the original message encryption letters displacement (shift cipher): modulus calculation. Ek (x) = (x+ K) mod 26, Dk (y) = (y-k) mod 26, such as: k
Update
: 2008-10-13
Size
: 5.54kb
Publisher
:
李艳
RSA
Downloaded:0
Application of non-symmetric key system, RSA cryptosystem for data signature code
Update
: 2008-10-13
Size
: 3.42mb
Publisher
:
李彦
RSA1
Downloaded:0
RSA encryption algorithm. It was the first not only for data encryption can be used for digital signature algorithms. It is easy to understand and operate, but also very popular. Algorithm s name to the name of the inven
Update
: 2008-10-13
Size
: 86.16kb
Publisher
:
yinmg
«
1
2
...
.42
.43
.44
.45
.46
1447
.48
.49
.50
.51
.52
...
1665
»
CodeBus
is the largest source code store in internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.