CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Crack Hack
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Crack Hack list
Sort by :
«
1
2
...
.49
.50
.51
.52
.53
354
.55
.56
.57
.58
.59
...
1665
»
MD5
Downloaded:0
md5 is a hash function.
Update
: 2025-01-17
Size
: 790kb
Publisher
:
andy
MD5
Downloaded:0
a hash function md5 for a java code, it has been run successfully.
Update
: 2025-01-17
Size
: 794kb
Publisher
:
andy
3des
Downloaded:0
3DES is a encryption algorithm ,this algorithm has run successfully.
Update
: 2025-01-17
Size
: 10.86mb
Publisher
:
andy
SHA1
Downloaded:0
a hash function SHA1 has run successfully. Welcome to download. if you like, donnot forget to give me a comment.
Update
: 2025-01-17
Size
: 796kb
Publisher
:
andy
the-RC4-algorithm
Downloaded:0
The RC4 algorithm is the encryption technology in the field of electronic information means for wireless communication networks.
Update
: 2025-01-17
Size
: 1kb
Publisher
:
zhaomingming
otp
Downloaded:0
Dynamic password authentication challenge response mechanism
Update
: 2025-01-17
Size
: 4kb
Publisher
:
赵齐月
En_File
Downloaded:0
Using CSP to encrypt files, this is a use of CSP.
Update
: 2025-01-17
Size
: 13kb
Publisher
:
谭峰
DES
Downloaded:0
DES encryption and decryption in vesual c
Update
: 2025-01-17
Size
: 4kb
Publisher
:
Sarker Raju
ConnectFour
Downloaded:0
Java Connect Four game. With Gui and "human vs human" and "human vs computer" play modes
Update
: 2025-01-17
Size
: 207kb
Publisher
:
Sarina
DES
Downloaded:0
DES symmetric encryption algorithm implemented in Java, use Java encryption class package, achieve DES encryption and decryption of text.
Update
: 2025-01-17
Size
: 3kb
Publisher
:
姚馨
SHA
Downloaded:0
SHA message digest algorithm to achieve a simple procedure. Using the Java language. The implementation is simple and clear.
Update
: 2025-01-17
Size
: 3kb
Publisher
:
姚馨
ASFDSAF
Downloaded:0
Topic: a company USES the public telephone relay data, data is four integers, in the relay in the process is encrypted, encryption rules are as follows: Each Numbers add 5, then use and divided by the number of 10 instea
Update
: 2025-01-17
Size
: 2kb
Publisher
:
崔嬴
«
1
2
...
.49
.50
.51
.52
.53
354
.55
.56
.57
.58
.59
...
1665
»
CodeBus
is the largest source code store in internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.