Welcome![Sign In][Sign Up]
Location:
SourceCode OS program Crack Hack

Crack Hack List Page 1524

« 1 2 ... .19 .20 .21 .22 .23 1524.25 .26 .27 .28 .29 ... 1665 »

[Crack HackRijnd

Description: Rijndael algorithm using arbitrary file encryption. To arbitrary N of a document is divided into 16-byte groups, and finally a group of less than 16 bytes can be used to fill space!
Platform: | Size: 46893 | Author: 丁莉娜 | Hits:

[Crack HackMIRACL

Description: With large numbers MIRACL library to achieve the shared computing software security register.
Platform: | Size: 314945 | Author: 丁莉娜 | Hits:

[Crack Hackchaos

Description: For Logistic mapping, a digital image iterative chaotic encryption algorithm is implemented
Platform: | Size: 174915 | Author: 丁莉娜 | Hits:

[Crack HackEncrypt

Description: What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemen
Platform: | Size: 9683 | Author: 刘博 | Hits:

[Crack HackSecureChat

Description: Provide encrypted c/s chat program. Using symmetric encryption algorithms and asymmetric encryption algorithms, to achieve the security of client-server chat
Platform: | Size: 268936 | Author: 梅三 | Hits:

[Crack HackEncryptionAlgorithm

Description: Blowfish encryption algorithm, use before loading a document Blowfish.java
Platform: | Size: 874 | Author: 李勃 | Hits:

[Crack Hackwenjian

Description: Encryption, security, compression treatment, examples have lovers can learn
Platform: | Size: 69405 | Author: 王朱忠 | Hits:

[Crack Hackjiami

Description: Database access interface encryption algorithm source code may need to be adjusted according to algorithm
Platform: | Size: 25728 | Author: 雷天兆 | Hits:

[Crack HackPGP.Corporation.PGP.SDK.v3.7.2.044998

Description: err
Platform: | Size: 7780129 | Author: leejia | Hits:

[Crack Hackjiakeji

Description: Principle: The Pe documents. Data section,. Text section to XOR encryption, and then will take declassified documents Loader write head and the first between the beginning of paragraph, modify Entry Point to point Loader
Platform: | Size: 458407 | Author: 东南 | Hits:

[Crack Hackjiakeji1

Description: Principle: The Pe documents. Data section,. Text section to XOR encryption, and then will take declassified documents Loader write head and the first between the beginning of paragraph, modify Entry Point to point Loader
Platform: | Size: 457170 | Author: 东南 | Hits:

[Crack Hackaes_8bit

Description: VHDL realize 128bitAES encryption algorithm LOW AREA realize cost-saving DATA FLOW for 8 bits
Platform: | Size: 20038 | Author: ZHUOHUI LI | Hits:
« 1 2 ... .19 .20 .21 .22 .23 1524.25 .26 .27 .28 .29 ... 1665 »

CodeBus www.codebus.net