Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .04 .05 .06 .07 .08 509.10 .11 .12 .13 .14 ... 1665 »
Downloaded:0
This source code is written in JAVA grounds of symmetric encryption algorithms AES, elaboration of the various transformations.
Update : 2025-01-21 Size : 20kb Publisher : 熊松

Downloaded:0
The basics of encryption and decryption, encryption and decryption technology detailing the principles, methods and advantages and disadvantages of various methods, and contains some simple examples.
Update : 2025-01-21 Size : 348kb Publisher : 云云

Downloaded:0
Base64 is a 64-base position count. It uses the maximum power of 2 to represent the only printable ASCII characters. This makes it available as an e-mail transmission encoding. The variables used in Base64 characters AZ,
Update : 2025-01-21 Size : 15kb Publisher : sysmng

Downloaded:0
vigenere text document is encrypted, to achieve the text of the document encryption and decryption.
Update : 2025-01-21 Size : 1kb Publisher : yaya

Downloaded:0
DES encryption and decryption algorithm, encrypted file or string into a string des
Update : 2025-01-21 Size : 83kb Publisher : ftren

Downloaded:0
rsa encryption and decryption algorithm code rsa encryption and decryption algorithms to understand the specific steps and specific analysis
Update : 2025-01-21 Size : 8kb Publisher : l

Downloaded:0
srtdes encryption support 3des encryption
Update : 2025-01-21 Size : 3kb Publisher : 张勋

Downloaded:0
Safety of DES encryption and decryption library to decrypt 3DES DES encryption 3DES decryption password verification card computing applications mac
Update : 2025-01-21 Size : 57kb Publisher : ly

Downloaded:1
National Social Insurance IC card in the joint trial, the levels of key management center using key management system to achieve key security management. Key management system uses the 3DES encryption algorithm, using th
Update : 2025-01-21 Size : 192kb Publisher : ly

Downloaded:0
1 in line with the " China financial integrated circuit (IC) card specification" , " China financial integrated circuit (IC) card application specification." 2 data files to support binary file, fixed-len
Update : 2025-01-21 Size : 211kb Publisher : ly

Downloaded:0
In this system, the authorization and card key into two parts. The authorization process is the key in a key management system to produce the total control and total control of the key card key authentication card, and t
Update : 2025-01-21 Size : 695kb Publisher : ly

Downloaded:0
Achieve key security control and management of the entire application system security key, " Key management system" designed to follow the " China financial integrated circuit (IC) card specification (1.0)&qu
Update : 2025-01-21 Size : 4.88mb Publisher : ly
« 1 2 ... .04 .05 .06 .07 .08 509.10 .11 .12 .13 .14 ... 1665 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.