Welcome![Sign In][Sign Up]
Location:
SourceCode OS program Crack Hack

Crack Hack List Page 1561

« 1 2 ... .56 .57 .58 .59 .60 1561.62 .63 .64 .65 .66 ... 1665 »

[Crack HackCaesar_demo

Description: the source Caesar is a realization of a simple algorithm for the Console, is a demonstration program.
Platform: | Size: 3064 | Author: 张华 | Hits:

[Crack HackHill_encpyt_decrypt_system

Description: the source of Hill simple algorithm to achieve, Compression packet contains crypt and decrypt two catalogs, respectively encryption and decryption.
Platform: | Size: 5017 | Author: 张华 | Hits:

[Crack HackRSA_crypt_system

Description: this source is the use of JAVA RSA public key cryptography algorithm example of a simple procedure.
Platform: | Size: 10629 | Author: 张华 | Hits:

[Crack HackA5Encryption

Description: A5 algorithm using encryption and decryption algorithms, A5 algorithm used LFSR flow of data encryption and decryption operations.
Platform: | Size: 56587 | Author: liudongxiao | Hits:

[Crack HackIDEAEncryption

Description: IDES text file encryption and decryption, the use of data to a 64, 128-key encryption.
Platform: | Size: 18474 | Author: liudongxiao | Hits:

[Crack HackDES_Encryption

Description: DES encryption and decryption of text files, using a method of encryption and decryption of encrypted data, a length of 64.
Platform: | Size: 64388 | Author: liudongxiao | Hits:

[Crack Hack3DES_Encryption

Description: 3DES algorithm is enhanced by DES algorithm, the use of 128-bit key length, CBC mode of use of a feedback mechanism password usage patterns.
Platform: | Size: 63105 | Author: liudongxiao | Hits:

[Crack HackCBC_DESEncryption

Description: use of a method of encryption and decryption of encrypted data, a length of 64. the use of the feedback mechanism to use a password.
Platform: | Size: 67447 | Author: liudongxiao | Hits:

[Crack Hackdoublerandomphaseencryptionofbiologytrait

Description: procedures for the image of encryption and hidden in the encryption process, the original image encryption into white noise, allow an attacker not declassified. This procedure only for academic exchanges.
Platform: | Size: 1592 | Author: 肖海 | Hits:

[Crack Hackimageattackandencryption

Description: this procedure only for academic exchanges, if used for other commercial purposes, I have nothing to do.
Platform: | Size: 1238 | Author: 肖海 | Hits:

[Crack Hackdes_c1

Description: a classic DES encryption procedures, is worth learning and reference
Platform: | Size: 6091 | Author: kevin.liu | Hits:

[Crack HackCrypTool_1_4_00

Description: a very popular packet of cryptography tool s, it encloses the most common algorithm used and p rotocols
Platform: | Size: 56878240 | Author: zhyu hu | Hits:
« 1 2 ... .56 .57 .58 .59 .60 1561.62 .63 .64 .65 .66 ... 1665 »

CodeBus www.codebus.net