CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Crack Hack
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Crack Hack list
Sort by :
«
1
2
...
.76
.77
.78
.79
.80
1581
.82
.83
.84
.85
.86
...
1660
»
sanpack_rsa_vs2003sln_src
Downloaded:0
RSA algorithm analysis application, appraisal document RSA encryption algorithm application of the feasibility and significance. Practical design of a complete set of documents RSA encryption solution to achieve specific
Date
: 2008-10-13
Size
: 1mb
User
:
周刘兵
DES_MD5
Downloaded:0
C wrote two security MD5 and the DES algorithm is limited enlighten everyone
Date
: 2008-10-13
Size
: 128.46kb
User
:
徐欣民
keyring-2.0-pre6.tar
Downloaded:0
keyring is a PALM China for the protection of critical information systems, protection of data including user name, password, credit card number, etc.
Date
: 2008-10-13
Size
: 235.74kb
User
:
姓名
cryptmount-1.1.1.tar
Downloaded:1
Cryptmount of the Linux system and the file system of user equipment. Documents and other encryption systems.
Date
: 2008-10-13
Size
: 197.68kb
User
:
姓名
KeePassX-0.2.2.tar
Downloaded:0
KeePassX password protection for the safety of the use of high-strength encryption database
Date
: 2008-10-13
Size
: 295.56kb
User
:
姓名
CDes_standard
Downloaded:0
the realization of the single DES encryption algorithm, which CDes.cpp to source files, Calling the document which functions as follows : dataofText.txt document is imported specifically, in exchange for various bits of
Date
: 2008-10-13
Size
: 10.48kb
User
:
李文
passdic
Downloaded:0
As many dictionaries generated passwords difficult to meet our requirements. If you forget the password of a part but recall if the use of conventional dictionary passwords generated password will be very huge, Blasting
Date
: 2008-10-13
Size
: 198.48kb
User
:
gsj0791
yymmxue
Downloaded:0
cryptography literature has a wonderful history, of course, close does not declare always played the leading role. Before the First World War, it was important to cryptography little progress emerged in the open literatu
Date
: 2008-10-13
Size
: 327.69kb
User
:
李志坚
DESencrypt
Downloaded:0
This achieved with c a DES encryption algorithm. Should be suitable for those interested in encryption right people.
Date
: 2008-10-13
Size
: 10.69kb
User
:
黄树林
duobiaotidai
Downloaded:0
a cycle of three multi-table instead of passwords, a table by key word method, (key word from the intended), Table No. 2 produced by shuffling method (note, a letter with a number of z ~ 0 ~ 25 he gathers), 3rd tables ge
Date
: 2008-10-13
Size
: 1.7kb
User
:
houny
032223
Downloaded:0
Let f (x) = 1 x x2 x5 x27, respectively try to write the following Shift Register : f (x) connected to the DSR polynomial; f (x) for connectivity polynomial LFSR. Connection options polynomial : f (x) = 1 x x4 x6 x30; F2
Date
: 2008-10-13
Size
: 1.58kb
User
:
houny
s-zhihuan
Downloaded:0
from a random file read 256 byte data area DArea form data, re-shuffling in law application to the formation of 0 ~ 255 DTab a full array. Try to write were "seeking DArea by which all data (1) DTab S-boxes; (2) DTab rep
Date
: 2008-10-13
Size
: 3.21kb
User
:
houny
«
1
2
...
.76
.77
.78
.79
.80
1581
.82
.83
.84
.85
.86
...
1660
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.