Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .00 .01 .02 .03 .04 1505.06 .07 .08 .09 .10 ... 1665 »
Downloaded:0
RSA symmetric, asymmetric encryption and decryption algorithms, source code and executable files, and they hope to learn cryptography helpful friend!
Update : 2008-10-13 Size : 421.79kb Publisher : 胡定勇

Downloaded:0
The source code for encryption and decryption without a password set up, after decompression can be used.
Update : 2008-10-13 Size : 122.21kb Publisher : 塔塔米尔

Downloaded:0
RSA encryption C source code 1978 on the emergence of this algorithm, it is the first not only for data encryption can be used for digital signature algorithms. It is easy to understand and operate, but also very popular
Update : 2008-10-13 Size : 5.44kb Publisher : zen

Downloaded:0
In this case the use of Delphi to achieve classic DES encryption and decryption algorithms, user-friendly, full-featured, code written specification is available for reference!
Update : 2008-10-13 Size : 332.01kb Publisher : 陈龙云

Downloaded:0
In this case the use of Delphi to achieve classic MD5 encryption algorithm, available for everyone to participate, I reprint!
Update : 2008-10-13 Size : 31.17kb Publisher : 陈龙云

Downloaded:0
The software is a text file of data security has been prepared, it can be selected to carry out a text file Encryption and Decryption operation. Operation is very simple, first selected to Canada and decrypt a text file,
Update : 2008-10-13 Size : 53.44kb Publisher : Hejun

Downloaded:0
err
Update : 2008-10-13 Size : 3.76kb Publisher : 徐凯波

Downloaded:0
Huffman coding on the document and then read the contents of decoding and then encoding
Update : 2008-10-13 Size : 9.63kb Publisher : jiang zhenhua

Downloaded:0
RC5 encryption algorithm// this procedure for the realization of RC5 encryption algorithm- Parameters 32/12/16
Update : 2008-10-13 Size : 1.87kb Publisher : wenxiao

Downloaded:0
blowfish encryption algorithm of the coding categories, using VC6 development, first by using BlowfishKeyInit () on the key used by blowfish initialization.
Update : 2008-10-13 Size : 7.87kb Publisher : gongyiling

Downloaded:0
MD5 encryption algorithm, can be encrypted on the file and buffer,
Update : 2008-10-13 Size : 2.5kb Publisher : gongyiling

Downloaded:0
Image edge information extraction using discrete wavelet transform of the embedded watermark
Update : 2008-10-13 Size : 1.23kb Publisher : 奚溪
« 1 2 ... .00 .01 .02 .03 .04 1505.06 .07 .08 .09 .10 ... 1665 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.