Welcome![Sign In][Sign Up]
Location:
Search - decrypt component

Search list

[Crack Hackaes

Description: AES Core Modules In this document I describe components designated to encoding and decoding using AES. aes enc — parametrizable component which can encrypt input data, using 128, 192 and 256 bit key, • aes dec — parametrizable component which can decrypt input data, using 128, 192 and 256 bit key, • key expansion — parametrizable component which can produce key expansion, using 128, 192 and 256 bit key,
Platform: | Size: 10070 | Author: liangraul | Hits:

[Crack Hackaes

Description: AES Core Modules In this document I describe components designated to encoding and decoding using AES. aes enc — parametrizable component which can encrypt input data, using 128, 192 and 256 bit key, • aes dec — parametrizable component which can decrypt input data, using 128, 192 and 256 bit key, • key expansion — parametrizable component which can produce key expansion, using 128, 192 and 256 bit key,-AES Core Modules In this document I describe components designated to encoding and decodingusing AES.aes enc- parametrizable component which can encrypt input data, using128, 192 and 256 bit key,
Platform: | Size: 10240 | Author: liangraul | Hits:

[JSP/JavaStringUtils

Description: 1.字符处理组件,包括数据编码的转换,数据简单加密解密以及其他数据的处理方法.具体说明请见Document\StringUtils.doc. 2.Class文件夹下存放的是编译好了的class文件,可以直接使用. 3.在sample下有该组件使用的jsp例子. 4.原代码请参照source文件夹下的StringUtils.java. 5.Enviroument文件中存放的SystemConfig.java是用来读取配置文件中内码外码信息的,在StringUtils.java中exchange()和getISO8859()将用到. 6.在用到decodeBase64(String data)方法解密中文加密后的字符时,需要进行GB2312转玛才能正确显示解码内容(中文).-1. Character processing components, including data encoding conversion, data encryption and decryption as well as other data on a simple approach. Specifically, see Document \ StringUtils.doc. 2.Class folder is stored in good to compile the class files, can be used directly. 3. In the sample under the jsp examples of the use of the component. 4. the original source codes, please refer to the folder under the StringUtils.java. 5.Enviroument files stored SystemConfig.java is used to read configuration file in the code information within the yards, in StringUtils.java the exchange () and getISO8859 () will be used. 6. In use decodeBase64 (String data) method to decrypt encrypted in Chinese characters, you need to switch to ma GB2312 correctly Display decoding (English).
Platform: | Size: 24576 | Author: fangmin | Hits:

[Delphi VCLDCPCrypt2

Description: Encrypt and Decrypt Component free (HASHs CIPHERs, etc..)
Platform: | Size: 481280 | Author: ctvoicer | Hits:

[OAliandadongli_OA_4.0

Description: 破解文件share在目录: 联达动力oa完全无限制破解文件 代码解密的所有ASP文件在目录: LKOA40 , 使用方法,可以直接完全覆盖原来安装的OA目录中文件,已经带了破解。 其他目录为官方补丁程序。 破解原理: 屏蔽了系统中ADO组件的执行结果,尽管组件仍然执行,但系统 不受任何影响,可以正常使用,跳过ADO环节,任你使用几百年都没问题了-Crack file share in the directory: Union of full, unrestricted power oa crack the code to decrypt the file, all ASP files in the directory: LKOA40, use, installation can completely overwrite the original files in the directory of OA, has brought a break. Other directories for the official patch. Crack theory: ADO components in the system shielding results of the implementation, although the component is still running, but without any impact on the system, can be used normally, skip the ADO part, any of you use for hundreds of years no problem
Platform: | Size: 22844416 | Author: kong | Hits:

[OtherCrypto123

Description: Each letter is represented by a number modulo 26. (Often the simple scheme A = 0, B = 1, ..., Z = 25 is used, but this is not an essential feature of the cipher.) To encrypt a message, each block of n letters (considered as an n-component vector) is multiplied by an invertible n × n matrix, again modulus 26. To decrypt the message, each block is multiplied by the inverse of the matrix used for encryption. The matrix used for encryption is the cipher key, and it should be chosen randomly from the set of invertible n × n matrices (modulo 26). The cipher can, of course, be adapted to an alphabet with any number of letters all arithmetic just needs to be done modulo the number of letters instead of modulo 26. Consider the message ACT , and the key below (or GYBNQKURP in letters):-Each letter is represented by a number modulo 26. (Often the simple scheme A = 0, B = 1, ..., Z = 25 is used, but this is not an essential feature of the cipher.) To encrypt a message, each block of n letters (considered as an n-component vector) is multiplied by an invertible n × n matrix, again modulus 26. To decrypt the message, each block is multiplied by the inverse of the matrix used for encryption. The matrix used for encryption is the cipher key, and it should be chosen randomly from the set of invertible n × n matrices (modulo 26). The cipher can, of course, be adapted to an alphabet with any number of letters all arithmetic just needs to be done modulo the number of letters instead of modulo 26. Consider the message ACT , and the key below (or GYBNQKURP in letters):
Platform: | Size: 10240 | Author: gunay | Hits:

[Delphi/CppBuilderEncrypt And Decrypt Base 64 Indy Componet

Description: Encrypt Base 64 Indy Component
Platform: | Size: 5120 | Author: E_MM | Hits:

CodeBus www.codebus.net