Welcome![Sign In][Sign Up]
Location:
SourceCode OS program Crack Hack

Crack Hack List Page 1447

« 1 2 ... .42 .43 .44 .45 .46 1447.48 .49 .50 .51 .52 ... 1665 »

[Crack HackCRC_METHOD

Description: CRC algorithm theory and C language (introduced three kinds of methods). Pdf
Platform: | Size: 124570 | Author: tonard | Hits:

[Crack HackRijndaelTest

Description: This RIJNDAEL algorithm is used to produce the ciphertext sequence JAVA algorithm, according to my need to write, if you want to use it, as long as the change in the main function will be under the
Platform: | Size: 5401 | Author: 李锋 | Hits:

[Crack HackBitmapToFile

Description: An example of encryption, and hope to image processing to help to everyone
Platform: | Size: 1255872 | Author: 宁梓淯 | Hits:

[Crack Hack3DES

Description: 3DES encryption and decryption algorithms. The algorithm through the compiler can be used directly with the API, as a considerable convenience.
Platform: | Size: 34940 | Author: zuiwengoo | Hits:

[Crack HackMyDiary

Description: Powerful notebook, can achieve a lot of features, debugging through
Platform: | Size: 1434170 | Author: fsdaf | Hits:

[Crack Hackencode

Description: C# Write the encryption and decryption procedures, can quickly complete the encryption and decryption
Platform: | Size: 1207 | Author: fsdaf | Hits:

[Crack Hackzcrc500

Description: This source Reader source as an indispensable part. For beginners to read
Platform: | Size: 1840 | Author: 彭飞 | Hits:

[Crack Hack3des

Description: 3DES encryption and decryption algorithm of a c++ Achieve. Network can use string encryption.
Platform: | Size: 6298 | Author: chenchen | Hits:

[Crack HackVeriFile_sha256

Description: sha256 encryption algorithm, a vc++ achieve. Network can use string encryption.
Platform: | Size: 92073 | Author: chenchen | Hits:

[Crack Hackjmjm.ZIP

Description: A sample algorithm for encryption and decryption of a Vc++ Achieve. Network can use string encryption.
Platform: | Size: 23376 | Author: chenchen | Hits:

[Crack Hackaa

Description: Caesar the process of password, and then matching the letters to replace the original message encryption letters displacement (shift cipher): modulus calculation. Ek (x) = (x+ K) mod 26, Dk (y) = (y-k) mod 26, such as: k
Platform: | Size: 5678 | Author: 李艳 | Hits:

[Crack HackRSA

Description: Application of non-symmetric key system, RSA cryptosystem for data signature code
Platform: | Size: 3581435 | Author: 李彦 | Hits:
« 1 2 ... .42 .43 .44 .45 .46 1447.48 .49 .50 .51 .52 ... 1665 »

CodeBus www.codebus.net