Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .80 .81 .82 .83 .84 1585.86 .87 .88 .89 .90 ... 1665 »
Downloaded:0
the realization of the single DES encryption algorithm, which CDes.cpp to source files, Calling the document which functions as follows : dataofText.txt document is imported specifically, in exchange for various bits of
Update : 2008-10-13 Size : 10.48kb Publisher : 李文

Downloaded:0
As many dictionaries generated passwords difficult to meet our requirements. If you forget the password of a part but recall if the use of conventional dictionary passwords generated password will be very huge, Blasting
Update : 2008-10-13 Size : 198.48kb Publisher : gsj0791

Downloaded:0
cryptography literature has a wonderful history, of course, close does not declare always played the leading role. Before the First World War, it was important to cryptography little progress emerged in the open literatu
Update : 2008-10-13 Size : 327.69kb Publisher : 李志坚

Downloaded:0
This achieved with c a DES encryption algorithm. Should be suitable for those interested in encryption right people.
Update : 2008-10-13 Size : 10.69kb Publisher : 黄树林

Downloaded:0
a cycle of three multi-table instead of passwords, a table by key word method, (key word from the intended), Table No. 2 produced by shuffling method (note, a letter with a number of z ~ 0 ~ 25 he gathers), 3rd tables ge
Update : 2008-10-13 Size : 1.7kb Publisher : houny

Downloaded:0
Let f (x) = 1 x x2 x5 x27, respectively try to write the following Shift Register : f (x) connected to the DSR polynomial; f (x) for connectivity polynomial LFSR. Connection options polynomial : f (x) = 1 x x4 x6 x30; F2
Update : 2008-10-13 Size : 1.58kb Publisher : houny

Downloaded:0
from a random file read 256 byte data area DArea form data, re-shuffling in law application to the formation of 0 ~ 255 DTab a full array. Try to write were "seeking DArea by which all data (1) DTab S-boxes; (2) DTab rep
Update : 2008-10-13 Size : 3.21kb Publisher : houny

Downloaded:0
two of 16 power-positive integer d and n, calculate the preparation of d-1 (mod n); 2. For not more than 2 3 16 Powers positive integers a, e and n, calculate the preparation ae (mod n) procedures. In the above procedure
Update : 2008-10-13 Size : 2.37kb Publisher : houny

Downloaded:1
affine encryption algorithm is relatively simple
Update : 2008-10-13 Size : 847byte Publisher : kkct

Downloaded:0
xilinx companies Triple DES encryption code used for simulating an internal document
Update : 2008-10-13 Size : 13.2kb Publisher : 王晓涧

Downloaded:0
hidden software !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Update : 2008-10-13 Size : 849.51kb Publisher : dddd

Downloaded:0
blind input method, using Microsoft's TTS achieve blind calligraphy
Update : 2008-10-13 Size : 390.97kb Publisher : 徐敏
« 1 2 ... .80 .81 .82 .83 .84 1585.86 .87 .88 .89 .90 ... 1665 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.