Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .74 .75 .76 .77 .78 1579.80 .81 .82 .83 .84 ... 1660 »
Downloaded:0
C development of a simple DES encryption and decryption procedures, definitely can be used, compile. But only the characters operation, not encrypting documents
Date : 2008-10-13 Size : 115.75kb User : 王选

Downloaded:0
encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives :- To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algo
Date : 2008-10-13 Size : 379.94kb User : Nikii

Downloaded:0
: jdk1.4 based on the encryption algorithm to realize the algorithm including MD5, SHA-1, DES, DESede, RSA, etc.
Date : 2008-10-13 Size : 982.46kb User : 王雷

Downloaded:0
the MFC category and convenient. CMD5 : : GetMD5 ( "123") it simple
Date : 2008-10-13 Size : 11.96kb User : fhq

Downloaded:0
use an iterative equation Xn Asin2 = (Xn- XB) generated chaotic sequence (Xi) need input A and isolate value, different values in different encryption effect, but only in the chaotic region of encryption is the best. In
Date : 2008-10-13 Size : 81.92kb User : Iris Liu

Downloaded:0

Date : 2008-10-13 Size : 175.4kb User : 刘佳国

Downloaded:0
Chat LAN encryption procedures, using the RSA encryption algorithm, can guarantee that the privacy Chat
Date : 2008-10-13 Size : 41.8kb User : senxly

Downloaded:0
the realization of this procedure des plus decryption functions, each of the 64 encrypted ciphertext, thus achieving all of the increase in declassified documents.
Date : 2008-10-13 Size : 5.7kb User : liyunfei

Downloaded:0
md5 algorithm, used to achieve the c-achieving md5_16
Date : 2008-10-13 Size : 3.63kb User : fsdagdsa

Downloaded:0
MD5 algorithm to achieve java* Below these S11- S44 is a 4* 4 Moment RUF, in a primitive realization of the C# define is achieved, Here they become static final realization of the said CD. cut in the same process space w
Date : 2008-10-13 Size : 8.27kb User : liwei

Downloaded:0
I designed the DSB concealed voice example. ELANIX company with the SYSTEMVI EW open operation. their cover and concealment signal input and output signals required to set up voice source, For example, recording their vo
Date : 2008-10-13 Size : 1.85kb User : a

Downloaded:0
latest perl language MD algorithm procedures can be directly entered the lib directory application
Date : 2008-10-13 Size : 970byte User : canoe
« 1 2 ... .74 .75 .76 .77 .78 1579.80 .81 .82 .83 .84 ... 1660 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.