Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .63 .64 .65 .66 .67 1568.69 .70 .71 .72 .73 ... 1660 »
Downloaded:0
Shamir secret sharing algorithm to achieve the java, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion t
Date : 2008-10-13 Size : 4.76kb User : linvg

Downloaded:1
S-encryption algorithm for the importation of an eight expressly group and a 10 Key, Output for the eight-man group of close, decryption algorithm input is a secret eight-man group and one of the ten key, Output-8 group
Date : 2008-10-13 Size : 4.31kb User : linvg

Downloaded:0
S-DES encryption algorithm for the importation of an eight expressly group and a 10 Key, Output for the eight-man group of close, decryption algorithm input is a secret eight-man group and one of the ten key, Output-8 gr
Date : 2008-10-13 Size : 37.85kb User : linvg

Downloaded:0
simple C code (8 encryption and decryption).
Date : 2008-10-13 Size : 1.37kb User : 浪人

Downloaded:0
an encryption and decryption example, the use of symmetric cryptography file encryption, provide the user interface visualization, understand the process of encryption and decryption results
Date : 2008-10-13 Size : 7.61kb User : gongchao

Downloaded:0
this procedure is introduced for the gsm a5 algorithm, c is the language of instruction.
Date : 2008-10-13 Size : 8.28kb User : gongchao

Downloaded:0
use vc good encryption coding algorithm has strong security functions
Date : 2008-10-13 Size : 9.54kb User : lianyufen

Downloaded:1
traditional offline store two VC-2 source offline store VC-2 source offline store VC-2 source offline store VC-2 source offline store VC FO
Date : 2008-10-13 Size : 68.41kb User : frank

Downloaded:0
completed digital image encryption and decryption process. be right. BMP or. JPG format images encryption and digital watermarking completion of the Secretariat of the key functions of extraction. The encryption algorith
Date : 2008-10-13 Size : 994.41kb User : wukongpei

Downloaded:1
use of the NTL large integer achieve RSA public key cryptography algorithm, can be used to text file encryption and decryption. Windows98 platform above, VC 6.0, trails are internal documents relative path, we can not co
Date : 2008-10-13 Size : 1.83mb User : 李刚

Downloaded:1
JAVA SimpleDes algorithm, the algorithm is simple, very practical
Date : 2008-10-13 Size : 103.33kb User : zhou_sa01

Downloaded:0
Caesar PIN-code expansion Caesar, C language version. Cryptography a test
Date : 2008-10-13 Size : 789byte User : conner
« 1 2 ... .63 .64 .65 .66 .67 1568.69 .70 .71 .72 .73 ... 1660 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.