CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Crack Hack
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Crack Hack list
Sort by :
«
1
2
...
.57
.58
.59
.60
.61
1062
.63
.64
.65
.66
.67
...
1660
»
RSA
Downloaded:0
RSA encryption algorithm on the principle. Described in detail what is RSA encryption algorithm, and the encryption process.
Date
: 2025-09-13
Size
: 107kb
User
:
栾若星
PlayFair
Downloaded:0
Playfair algorithm realize a good share to the U.S.
Date
: 2025-09-13
Size
: 18kb
User
:
Dave
Caesar
Downloaded:0
Caesar algorithms realize a good share to the U.S.
Date
: 2025-09-13
Size
: 1kb
User
:
Dave
RSAtool
Downloaded:0
This semester, I just learned cryptography, RSA algorithm is relatively simple, so I wrote this small software. Development environment: vc ++ 6.0. RSA security depends on large number decomposition. Both public and priv
Date
: 2025-09-13
Size
: 425kb
User
:
宋芬
fastcoll_v1.0.0.5_source
Downloaded:0
md5 collision verification process, can be constructed of two exe files the same md5.
Date
: 2025-09-13
Size
: 26kb
User
:
macro
aes
Downloaded:0
Advanced Encryption Algorithm on the realization of aes. Contain dynamically generated and static model to generate two kinds of
Date
: 2025-09-13
Size
: 9kb
User
:
qqtt
DES
Downloaded:0
des realize a complete, ecb mode can be directly used for encryption and decryption demo
Date
: 2025-09-13
Size
: 124kb
User
:
qqtt
MD5
Downloaded:0
Digital realization of md5 digest algorithm, you can direct demonstration Abstract
Date
: 2025-09-13
Size
: 28kb
User
:
qqtt
1
Downloaded:0
Write a text file encryption program and a decryption process. Password rules are: For the lowercase letters, a replaced by x, b replaced by y, c replaced by z, d replaced by a, e replaced by b ,... for capital letters,
Date
: 2025-09-13
Size
: 3kb
User
:
lbzhahaha
computer-cyphers
Downloaded:0
Cryptography to secure communications for the purpose of research, but limited to data communications. Cryptographic techniques also applies to information to identify and digital identification, to prevent spoofing. Pas
Date
: 2025-09-13
Size
: 4.12mb
User
:
lf
ourdev_197172
Downloaded:0
IAR 4.10A cracked software, have a friend interested in can be downloaded from
Date
: 2025-09-13
Size
: 331kb
User
:
lijie
vc_des_class_revision
Downloaded:0
des encryption and decryption algorithms, a good string encryption and decryption
Date
: 2025-09-13
Size
: 2.42mb
User
:
«
1
2
...
.57
.58
.59
.60
.61
1062
.63
.64
.65
.66
.67
...
1660
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.