CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Crack Hack
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Crack Hack list
Sort by :
«
1
2
...
.96
.97
.98
.99
.00
1001
.02
.03
.04
.05
.06
...
1660
»
kasumi
Downloaded:0
KASUMI encryption algorithm, mainly used in mobile communication encryption
Date
: 2025-06-26
Size
: 163kb
User
:
efzplay
Cxiedejiamijiemichengxu
Downloaded:0
C language to write small programs to support the encryption you use substitution technical writing
Date
: 2025-06-26
Size
: 1kb
User
:
贺龙
paixu
Downloaded:0
the use of hash table, use the hash function and includes a solution to the conflict
Date
: 2025-06-26
Size
: 2kb
User
:
chenyuehong
desPHP
Downloaded:0
This is a PHP achieved with DES encryption and decryption process, if it is encrypted for better place can be used 3DES, welcome more exchanges, there are good procedures for more exchanges.
Date
: 2025-06-26
Size
: 1kb
User
:
www
20081222(des-ka9q-1.0-i386-gnu).tar
Downloaded:0
DES encryption and decryption source code, c language, in the Linux system can be used directly after the compiler
Date
: 2025-06-26
Size
: 18kb
User
:
aoliang
DESHTM
Downloaded:0
A brief introduction of encryption des simple principle, can quickly grasp the characteristics des
Date
: 2025-06-26
Size
: 10kb
User
:
李欣欣
md5
Downloaded:0
Main is a complete MD5 algorithm, which includes part of the test, or extract from the document
Date
: 2025-06-26
Size
: 4kb
User
:
杨建春
sha
Downloaded:0
To support the SHA algorithm, on paper or string hash calculation can be applied directly in the proceedings, the formation of a document containing a summary.
Date
: 2025-06-26
Size
: 8kb
User
:
孟庆新
base64
Downloaded:0
Base64 encryption and decryption. Using C language. Facilitate the transplant.
Date
: 2025-06-26
Size
: 2kb
User
:
liangyong
zidianxu
Downloaded:0
In data encryption and data compression is often the need for special encoded string. Given the alphabet A by the 26 lowercase letters of the alphabet composed of A = (a, b, ..., z).
Date
: 2025-06-26
Size
: 26kb
User
:
周伦
Example
Downloaded:0
TEMIC algorithm, it is also useful are welcome to exchange,
Date
: 2025-06-26
Size
: 36kb
User
:
kill
bigint
Downloaded:1
Generate large prime numbers. For encryption and decryption. Specific elements: using C or C++ Language to prepare a generation of binary for the 1024 program of large prime numbers.
Date
: 2025-06-26
Size
: 21kb
User
:
ye ma
«
1
2
...
.96
.97
.98
.99
.00
1001
.02
.03
.04
.05
.06
...
1660
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.