Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .98 .99 .00 .01 .02 403.04 .05 .06 .07 .08 ... 1665 »
Downloaded:0
FSM Design,FSM origin FSM
Update : 2025-01-18 Size : 212kb Publisher : konserx

Downloaded:0
Design and Implementation of RSA algorithm
Update : 2025-01-18 Size : 5kb Publisher : 马景云

Downloaded:0
use DES/MD5 arithmetic,multithreads encrypt and decrypt,can copy and remove from one pc to another,can anonymity login or register login(save the encrypt records)
Update : 2025-01-18 Size : 142kb Publisher : 飞鹰

Downloaded:0
openssl display all uses
Update : 2025-01-18 Size : 18kb Publisher : hzangyanyan

Downloaded:0
The substitution tables (S-boxes) s_box and inv_s_box are used by the expanded key schedule function key_expansion and the en- and decrypting functions cipher and inv_cipher to directly substitute a byte (element of GF(2
Update : 2025-01-18 Size : 2kb Publisher : darshan

Downloaded:0
The inverse S-box is used in the decrypting function inv_cipher to revert the substitution carried out via the S-box. The corresponding AES-Matlab function declared in Line 1 of Listing 7 takes the Sbox (s_box) as its in
Update : 2025-01-18 Size : 2kb Publisher : darshan

Downloaded:0
The key expansion function takes the user supplied 16 bytes long key and utilizes the previously created round constant matrix rcon and the substitution table s_box to generate a 176 byte long key schedule w, which will
Update : 2025-01-18 Size : 1kb Publisher : darshan

Downloaded:0
The permutation function rot_word is declared in Line 1 . The input ”word” w_in is a row vector of four bytes and is cyclically permuted according to Figure 13. In Matlab the permutation can easily be achieved by utilizi
Update : 2025-01-18 Size : 1kb Publisher : darshan

Downloaded:0
the first task of the ”main” program aes_demo is a call to aes_init in Line 1. This initialization routine supplies 1 the actual en- and decryption functions (cipher and inv_cipher) with the expanded key schedule w, the
Update : 2025-01-18 Size : 2kb Publisher : darshan

own write jiami and jiemi c++ cla
Update : 2025-01-18 Size : 2kb Publisher : zjr

Downloaded:0
Caesar shift is one of the simplest and most widely known encryption techniques.
Update : 2025-01-18 Size : 1.69mb Publisher : olha_pupkin

Downloaded:0
Fundemental crytor is use all ciphers library. RC4, SHA1 , SHA256 , SHA512, Rijndael, AES 256
Update : 2025-01-18 Size : 164kb Publisher : qweqwe
« 1 2 ... .98 .99 .00 .01 .02 403.04 .05 .06 .07 .08 ... 1665 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.