Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .13 .14 .15 .16 .17 1418.19 .20 .21 .22 .23 ... 1660 »
Downloaded:0

Date : 2008-10-13 Size : 53.98kb User : p

Downloaded:0
RSA Laborary private collection of the relevant encryption library provides the most basic DES/RSA cryptographic algorithm, such as source code.
Date : 2008-10-13 Size : 100.62kb User : Robin

Downloaded:0

Date : 2008-10-13 Size : 1.32kb User : 李发动

Downloaded:0

Date : 2008-10-13 Size : 16.94kb User : 李发动

Downloaded:0

Date : 2008-10-13 Size : 6.03kb User : 李发动

Downloaded:0
Use of ANSI X9.17 standard simulation of a pseudo-random number generator, called the kernel encryption algorithm 3DES algorithm, in accordance with the standard requirements to produce 64-bit pseudo-random number and 64
Date : 2008-10-13 Size : 188.14kb User : wildkaede

Downloaded:0
Hill encryption algorithm the basic idea is to express the letter l a linear transformation through them is converted to k-secret alphabet. Off to do a secret as long as the inverse transform it. Key is the transformatio
Date : 2008-10-13 Size : 140.22kb User : wildkaede

Downloaded:0
Des Algorithm is a standard symmetric encryption algorithm, and its essence is clear after a series of complex changes in law, the general in the circumstances I do not know the password should be difficult to restore it
Date : 2008-10-13 Size : 176.33kb User : wildkaede

Downloaded:0
The algorithm input is less than the maximum length of 2128-bit message string, the output is 512-bit message digest, enter the message to 1024-bit group as a unit for processing. Realistic simulation of the SHA512 hash
Date : 2008-10-13 Size : 66.99kb User : wildkaede

Downloaded:0
DigitalSignature Algorithm (DSA) is a variation of the Signature Algorithm of Schnorr and ElGamal, which is used by the NIST as the DSS(DigitalSignature Standard). The following parameters are applied in the algorithm: P
Date : 2008-10-13 Size : 133.74kb User : wildkaede

Downloaded:0
An encrypted learning process, everyone improve their function, only to learn
Date : 2008-10-13 Size : 17.46kb User : 张没

Downloaded:0
LSB-based information hiding, the former part is encrypted, the information will be hidden to the picture in the latter part is decrypted.
Date : 2008-10-13 Size : 1.28kb User : xzy
« 1 2 ... .13 .14 .15 .16 .17 1418.19 .20 .21 .22 .23 ... 1660 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.