Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .64 .65 .66 .67 .68 1269.70 .71 .72 .73 .74 ... 1660 »
Downloaded:0
The algorithm of encrypted image completed in VC, applying the Arnold transform .It is valuable to people who will devote himself to infomation security
Date : 2025-06-11 Size : 51kb User : 杨柯

Downloaded:0
replacement substitution Cryptosystem S-P boxes of generators, can generate random boxes S and P boxes for the replacement substitution Cryptosystem encryption and decryption
Date : 2025-06-11 Size : 1kb User : 小华

Downloaded:2
password for this attack linear analysis of the S-box analysis, in order to achieve the S-P Cryptosystem attack
Date : 2025-06-11 Size : 1kb User : 小华

Downloaded:0
this code to achieve S-P password encryption and decryption, in this experiment uses S boxes and boxes of random generator P
Date : 2025-06-11 Size : 201kb User : 小华

differential cryptanalysis, the experiment of S-P Cryptosystem Differential Analysis
Date : 2025-06-11 Size : 136kb User : 小华

Downloaded:0
assess directly read out the password database, absolutely convenient, simple code
Date : 2025-06-11 Size : 12kb User : tzq

Downloaded:0
program of large prime numbers and if the judgment is not prime, then decomposition of the smallest prime number
Date : 2025-06-11 Size : 5kb User : car

Downloaded:0
This is a simple program with vb series of the quality factor of the decomposition process and is compiled by the exe files
Date : 2025-06-11 Size : 53kb User : car

Downloaded:0
used in the preparation of several generating program, run faster, the greatest can be analyzed 10 metric few
Date : 2025-06-11 Size : 1kb User : car

Downloaded:0
this is the addition of large numbers of Operational procedures for the array of large numbers of carrying large numbers to form
Date : 2025-06-11 Size : 1kb User : car

Downloaded:0
MD5 algorithm ASP. It MD4 increase on the basis of "safety-belt" (Safety-Belts) concept. Although MD5 than MD4 slightly slower, but more secure. MD5 also as a very good intermediate technology.
Date : 2025-06-11 Size : 6kb User : 汪钰红

Downloaded:0
des encryption algorithm c Program to express encryption eight, the test compiler.
Date : 2025-06-11 Size : 7kb User : 秦雷
« 1 2 ... .64 .65 .66 .67 .68 1269.70 .71 .72 .73 .74 ... 1660 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.