Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .18 .19 .20 .21 .22 1623.24 .25 .26 .27 .28 ... 1660 »
Downloaded:0
Verilog of MD5 algorithm is realized, includes testbench at the same time .
Date : 2008-10-13 Size : 4.69kb User : 张雷

Downloaded:0
provide certification services-landing procedures (Random Verification code change to prevent illegal entry); Provide server control procedures, administrators can allow, shielding and delete a user's landing client; Any
Date : 2008-10-13 Size : 33.61kb User : 侯兴龙

Downloaded:1
usemars (vc6) MRAS IBM's encryption algorithm, the algorithm is encrypted block into 16-byte, 16-byte out. Zip
Date : 2008-10-13 Size : 24.96kb User : 云中龙

Downloaded:0
use_des.zip (vc6) DES encryption block the use of block encryption algorithm eight characters, if more than eight characters behind information processing
Date : 2008-10-13 Size : 33.76kb User : 云中龙

Downloaded:0
This is a realization of the use VC.net AES S-box realization of the code, including inversion and the realization s box code
Date : 2008-10-13 Size : 7.66kb User : 刘力

C# to do encryption and decryption of things to do together, a little bit chaotic, but as the exchange of learning!
Date : 2008-10-13 Size : 17.12kb User : 边缘人

AES has been certified by the AES DELPHI, the better, we all give it a try and found the
Date : 2008-10-13 Size : 34.1kb User : aaa

6.0 carries on the free document encryption in Visual C using the Rijndael algorithm, a rijndael encryption algorithm use example, although the graphical interface does quite roughly, but procedure itself has the very m
Date : 2008-10-13 Size : 44.83kb User : 云中龙

Downloaded:0
Some source programs of encryption arithmetic.I don t know whether it is always existed or not.I will upload it if a lot of people have downloaded.
Date : 2008-10-13 Size : 275.5kb User : 王军

The linearity shift register is the stream cipher important constituent, this procedure realizes this method.
Date : 2008-10-13 Size : 10.87kb User : 王清华

Downloaded:0
a very handy and practical non-symmetric encryption algorithm, there are examples, complete source code.
Date : 2008-10-13 Size : 9.74kb User : 乐天

Downloaded:0
encryption and decryption algorithms CECREITY5.0 this document without password can be extracted directly run
Date : 2008-10-13 Size : 33.91kb User : 原宏智
« 1 2 ... .18 .19 .20 .21 .22 1623.24 .25 .26 .27 .28 ... 1660 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.