Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .52 .53 .54 .55 .56 1557.58 .59 .60 .61 .62 ... 1660 »
LZ77 algorithm and pattern matching algorithm KMP and the integration algorithm, Compression is an internal packet elaborate document, which document with the corresponding realization source.
Date : 2008-10-13 Size : 18.23kb User : 张华

Downloaded:0
within the compressed C is a simple realization of the RC5 cipher algorithm suitable for beginners Cryptography the people.
Date : 2008-10-13 Size : 4.84kb User : 张华

Downloaded:0
compressed within the papers only through a simple password system : Affine password (Affine Cipher) the analysis, design and implementation to illustrate the simple encryption thinking, From this thinking we could consi
Date : 2008-10-13 Size : 4.91kb User : 张华

Downloaded:1
the procedure is standard AES key to achieve a simple, which can be achieved in the key length of 128 .192.256 three, just learning for the people of cryptography.
Date : 2008-10-13 Size : 465.96kb User : 张华

Downloaded:0
the source Caesar is a realization of a simple algorithm for the Console, is a demonstration program.
Date : 2008-10-13 Size : 2.99kb User : 张华

the source of Hill simple algorithm to achieve, Compression packet contains crypt and decrypt two catalogs, respectively encryption and decryption.
Date : 2008-10-13 Size : 4.9kb User : 张华

Downloaded:0
this source is the use of JAVA RSA public key cryptography algorithm example of a simple procedure.
Date : 2008-10-13 Size : 10.38kb User : 张华

Downloaded:0
A5 algorithm using encryption and decryption algorithms, A5 algorithm used LFSR flow of data encryption and decryption operations.
Date : 2008-10-13 Size : 55.26kb User : liudongxiao

Downloaded:0
IDES text file encryption and decryption, the use of data to a 64, 128-key encryption.
Date : 2008-10-13 Size : 18.04kb User : liudongxiao

Downloaded:0
DES encryption and decryption of text files, using a method of encryption and decryption of encrypted data, a length of 64.
Date : 2008-10-13 Size : 62.88kb User : liudongxiao

Downloaded:0
3DES algorithm is enhanced by DES algorithm, the use of 128-bit key length, CBC mode of use of a feedback mechanism password usage patterns.
Date : 2008-10-13 Size : 61.63kb User : liudongxiao

Downloaded:0
use of a method of encryption and decryption of encrypted data, a length of 64. the use of the feedback mechanism to use a password.
Date : 2008-10-13 Size : 65.87kb User : liudongxiao
« 1 2 ... .52 .53 .54 .55 .56 1557.58 .59 .60 .61 .62 ... 1660 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.