Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .49 .50 .51 .52 .53 954.55 .56 .57 .58 .59 ... 1665 »
Downloaded:0
c# DES file encryption file encryption c# DES
Update : 2025-02-02 Size : 4kb Publisher : liuzhou

Downloaded:0
Give a lot of file encryption technology, which is divided into different levels to fit the needs of different occasions. Give here the most simple file encryption technology, which adopts the document-by-byte XOR with t
Update : 2025-02-02 Size : 1kb Publisher : 鲨鱼

Downloaded:2
* * DESCRIPTION * Base64 processes input in 24bit chunks by converting each chunk into 4 * bytes of output. It does so by splitting input into four 6bit groups and * using these as indexes in the following substitution t
Update : 2025-02-02 Size : 1kb Publisher : JerryJiang

Downloaded:0
AES implementation of the C language source code
Update : 2025-02-02 Size : 25kb Publisher : bianxiaoke

Downloaded:0
* This program is free software you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation either version 2, or (at your option) any * late
Update : 2025-02-02 Size : 1kb Publisher : xsw

Downloaded:0
des encryto and decryto minides Crypt_Decrypt algrithms
Update : 2025-02-02 Size : 194kb Publisher : wxg

Downloaded:0
CRC-test(edit with Visual C++)
Update : 2025-02-02 Size : 11kb Publisher : 江峰

Downloaded:0
RSA algorithm, the use of the environment VC, can achieve the RSA encryption and decryption functions.
Update : 2025-02-02 Size : 243kb Publisher : YZQ

Downloaded:0
EVRC complete source compression decompression algorithms, with a simple example program.
Update : 2025-02-02 Size : 615kb Publisher : Jason

Downloaded:0
Machine to make use of multi-layer perceptron xor Category
Update : 2025-02-02 Size : 2kb Publisher : yenlun

Downloaded:0
Classical cryptographic algorithm in a single table substitution cipher, transposition cipher, Vigenere cipher. Algorithm is relatively simple, way to use the command. Can be randomly generated and the key explicitly.
Update : 2025-02-02 Size : 2kb Publisher : baichi123

Downloaded:0
实现加密
Update : 2025-02-02 Size : 1kb Publisher : 李万绪
« 1 2 ... .49 .50 .51 .52 .53 954.55 .56 .57 .58 .59 ... 1665 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.