Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .06 .07 .08 .09 .10 1611.12 .13 .14 .15 .16 ... 1665 »
Downloaded:0
RC4 is a secure and very fast 8-bit stream cipher/psuedo-random number generator, with a 2^1700 interval
Update : 2008-10-13 Size : 1.39kb Publisher : 驱逐倭寇

Downloaded:0
AES encryption algorithm, the best encryption algorithm. Very good.
Update : 2008-10-13 Size : 185.64kb Publisher : 姜华

Downloaded:0
use encryption algorithm design, direct flow of the document encryption. Vc done with the user interface
Update : 2008-10-13 Size : 31.46kb Publisher : CodeMan

Downloaded:0
DES encryption and decryption algorithm C source research DES algorithm should look at the friends
Update : 2008-10-13 Size : 19.38kb Publisher : 肖蔚

Downloaded:0
DES algorithm to achieve the Java source code, research DES friends worth the download
Update : 2008-10-13 Size : 20.72kb Publisher : 肖蔚

Downloaded:0
RSA public key algorithm C source code, including source code, documentation, installation procedures, TEST procedures, as well as in Windows and the compiler UNIX_LINUX SCRIP, it is worth the download
Update : 2008-10-13 Size : 178.5kb Publisher : 肖蔚

Downloaded:0
a written 3DES encryption algorithm source code algorithm efficiency is good to learn a good example
Update : 2008-10-13 Size : 5.83kb Publisher : 宇宙的弦

Downloaded:0
des encryption algorithm achieved through categories to call.
Update : 2008-10-13 Size : 460.47kb Publisher : storm

Downloaded:0
current 500 commonly used encryption and decryption algorithms, all kinds of packaged as libraries. Easy-to-use, high operating efficiency.
Update : 2008-10-13 Size : 1.02mb Publisher : gw

Downloaded:0
immediately encryption algorithms, encryption and decryption using the same function, the secret does not change the length of the text. The website can be used or procedures.
Update : 2008-10-13 Size : 1.57kb Publisher : 黄冠

Downloaded:0
AES is a safety code for the use of information encryption standards. It supports 128, 192 and 256 of the keys. Within a full string and document encryption and decryption example.
Update : 2008-10-13 Size : 653.26kb Publisher : majy

Downloaded:0
hash (Hashing) search and search for a general law (searching) is not the same. The hash law, the pair (key value) or identification characters (identifier) in the memory address of the sender is by function (function) g
Update : 2008-10-13 Size : 24.01kb Publisher : HCJ
« 1 2 ... .06 .07 .08 .09 .10 1611.12 .13 .14 .15 .16 ... 1665 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.