Location:
Search - CRYPT
Search list
Description: How to create your personal CA certificate, signed your software, Crypt string or files with sha1-md5!
Enjoy
Platform: |
Size: 4878336 |
Author: TakeOver |
Hits:
Description: simple des algo
Crypt or De
Platform: |
Size: 4096 |
Author: Hellsonic |
Hits:
Description: cgi编辑器基于VB abs
accept
alarm
atan2
bind
binmode
bless
caller
chdir
chmod
chomp
chop
chown
chr
chroot
close
closedir
connect
cos
crypt
dbmclose
dbmopen
defined
delete
die
do
dump
each
eof
eval
exec
exists
exit
exp
fcntl
fileno-CGI EDITORabs
accept
alarm
atan2
bind
binmode
bless
caller
chdir
chmod
chomp
chop
chown
chr
chroot
close
closedir
connect
cos
crypt
dbmclose
dbmopen
defined
delete
die
do
dump
each
eof
eval
exec
exists
exit
exp
fcntl
fileno
Platform: |
Size: 68608 |
Author: 安当 |
Hits:
Description: Simple and very small string crypt/decrypt function
Without using the cryptinit you can already define encrypted strings in the source.
Using the cryptinit function you get a random cryptkey and you need to encrypt all plain strings first.
Example in commented in the source.
Platform: |
Size: 1024 |
Author: Hans211 |
Hits:
Description: 加密算法,包括 aes des rsm等常用算法-crypt algorithm
Platform: |
Size: 2048 |
Author: 谢山 |
Hits:
Description: ccrypt is a command line utility for encrypting and decrypting files and streams. It was designed as a replacement for the standard Unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael cipher, which is the U.S. government s chosen candidate for the Advanced Encryption Standard (AES). This cipher is believed to provide very strong security. A compatibility mode is included for decrypting legacy "unix crypt" files.
Platform: |
Size: 669696 |
Author: jmskhng |
Hits:
Description: Microchip Technology Inc. The crypt key, serial number and configuration data are stored in an EEPROM array which is not accessible via any external connection. The EEPROM data is pro-grammable but read-protected.
Platform: |
Size: 684032 |
Author: diger |
Hits:
Description: I use my blog as literally an online journal to record my activities and thoughts so I can look back at them later. Writing things down can also be therapeutic. As a side benefit, it serves as a form of communication with my friends and randoms (it helped me get my apartment).
Platform: |
Size: 1024 |
Author: gto |
Hits:
Description: System for Crypt Decrypt Triple Des.
Platform: |
Size: 47104 |
Author: gpaz |
Hits:
Description: AES高级加密算法源码。不错哦。有需要的人可以分享下-AES
Platform: |
Size: 874496 |
Author: zhao shufen |
Hits:
Description: Blowfish Crypt-decrypt algorithm
Platform: |
Size: 131072 |
Author: ariadnet |
Hits:
Description: 基于vb的加密算法,供大家研究使用,谢谢!-crypt
Platform: |
Size: 9216 |
Author: crx |
Hits:
Description: rc4
RC4 was initially a trade secret, but in September 1994 a description of it was anonymously posted to the Cypherpunks mailing list[3]. It was soon posted on the sci.crypt newsgroup, and from there to many sites on the Internet. The leaked code was confirmed to be genuine as its output was found to match that of proprietary software using licensed RC4. Because the algorithm is known, it is no longer a trade secret. The name "RC4" is trademarked, however. RC4 is often referred to as "ARCFOUR" or "ARC4" (meaning Alleged RC4, because RSA has never officially released the algorithm), to avoid possible trademark problems. It has become part of some commonly used encryption protocols and standards, including WEP and WPA for wireless cards and TLS.
Platform: |
Size: 10240 |
Author: long |
Hits:
Description: help you underestand crypt metod
Platform: |
Size: 149504 |
Author: newsatkey |
Hits:
Description: cr4-dotnet
RC4 was initially a trade secret, but in September 1994 a description of it was anonymously posted to the Cypherpunks mailing list[3]. It was soon posted on the sci.crypt newsgroup, and from there to many sites on the Internet. The leaked code was confirmed to be genuine as its output was found to match that of proprietary software using licensed RC4. Because the algorithm is known, it is no longer a trade secret. The name "RC4" is trademarked, however. RC4 is often referred to as "ARCFOUR" or "ARC4" (meaning Alleged RC4, because RSA has never officially released the algorithm), to avoid possible trademark problems. It has become part of some commonly used encryption protocols and standards, including WEP and WPA for wireless cards and TLS.
Platform: |
Size: 13312 |
Author: long |
Hits:
Description: snmp++3.2是HP公司基于snmp协议的开发包,以实现snmp网络管理软件开发-snmp++3.2 produced by hp is based snmp protocol to achieve snmp network manage software
Platform: |
Size: 3290112 |
Author: bryant |
Hits:
Description: DES Crypt adapted from unix crypt for delphi.
Platform: |
Size: 349184 |
Author: derkan |
Hits:
Description: 用Java编写地dos下地文件加密及解密。详细内容内详-Shimoji using Java write to dos file encryption and decryption. Details in some detail in
Platform: |
Size: 1024 |
Author: 韩一凡 |
Hits:
Description: capicom crypt\decrypt file ntr
Platform: |
Size: 7168 |
Author: wqs2010 |
Hits:
Description: is phone crypt software
Platform: |
Size: 1024 |
Author: cyberra2n |
Hits: