Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .42 .43 .44 .45 .46 1447.48 .49 .50 .51 .52 ... 1665 »
Downloaded:0
This RIJNDAEL algorithm is used to produce the ciphertext sequence JAVA algorithm, according to my need to write, if you want to use it, as long as the change in the main function will be under the
Update : 2008-10-13 Size : 5.27kb Publisher : 李锋

Downloaded:0
An example of encryption, and hope to image processing to help to everyone
Update : 2008-10-13 Size : 1.2mb Publisher : 宁梓淯

Downloaded:0
3DES encryption and decryption algorithms. The algorithm through the compiler can be used directly with the API, as a considerable convenience.
Update : 2008-10-13 Size : 34.12kb Publisher : zuiwengoo

Downloaded:1
Powerful notebook, can achieve a lot of features, debugging through
Update : 2008-10-13 Size : 1.37mb Publisher : fsdaf

Downloaded:0
C# Write the encryption and decryption procedures, can quickly complete the encryption and decryption
Update : 2008-10-13 Size : 1.18kb Publisher : fsdaf

Downloaded:0
This source Reader source as an indispensable part. For beginners to read
Update : 2008-10-13 Size : 1.8kb Publisher : 彭飞

Downloaded:0
3DES encryption and decryption algorithm of a c++ Achieve. Network can use string encryption.
Update : 2008-10-13 Size : 6.15kb Publisher : chenchen

Downloaded:0
sha256 encryption algorithm, a vc++ achieve. Network can use string encryption.
Update : 2008-10-13 Size : 89.92kb Publisher : chenchen

Downloaded:0
A sample algorithm for encryption and decryption of a Vc++ Achieve. Network can use string encryption.
Update : 2008-10-13 Size : 22.83kb Publisher : chenchen

Downloaded:0
Caesar the process of password, and then matching the letters to replace the original message encryption letters displacement (shift cipher): modulus calculation. Ek (x) = (x+ K) mod 26, Dk (y) = (y-k) mod 26, such as: k
Update : 2008-10-13 Size : 5.54kb Publisher : 李艳

Downloaded:0
Application of non-symmetric key system, RSA cryptosystem for data signature code
Update : 2008-10-13 Size : 3.42mb Publisher : 李彦

Downloaded:0
RSA encryption algorithm. It was the first not only for data encryption can be used for digital signature algorithms. It is easy to understand and operate, but also very popular. Algorithm s name to the name of the inven
Update : 2008-10-13 Size : 86.16kb Publisher : yinmg
« 1 2 ... .42 .43 .44 .45 .46 1447.48 .49 .50 .51 .52 ... 1665 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.