Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .18 .19 .20 .21 .22 1623.24 .25 .26 .27 .28 ... 1660 »
Downloaded:0
Verilog of MD5 algorithm is realized, includes testbench at the same time .
Update : 2008-10-13 Size : 4.69kb Publisher : 张雷

Downloaded:0
provide certification services-landing procedures (Random Verification code change to prevent illegal entry); Provide server control procedures, administrators can allow, shielding and delete a user's landing client; Any
Update : 2008-10-13 Size : 33.61kb Publisher : 侯兴龙

Downloaded:1
usemars (vc6) MRAS IBM's encryption algorithm, the algorithm is encrypted block into 16-byte, 16-byte out. Zip
Update : 2008-10-13 Size : 24.96kb Publisher : 云中龙

Downloaded:0
use_des.zip (vc6) DES encryption block the use of block encryption algorithm eight characters, if more than eight characters behind information processing
Update : 2008-10-13 Size : 33.76kb Publisher : 云中龙

Downloaded:0
This is a realization of the use VC.net AES S-box realization of the code, including inversion and the realization s box code
Update : 2008-10-13 Size : 7.66kb Publisher : 刘力

C# to do encryption and decryption of things to do together, a little bit chaotic, but as the exchange of learning!
Update : 2008-10-13 Size : 17.12kb Publisher : 边缘人

AES has been certified by the AES DELPHI, the better, we all give it a try and found the
Update : 2008-10-13 Size : 34.1kb Publisher : aaa

6.0 carries on the free document encryption in Visual C using the Rijndael algorithm, a rijndael encryption algorithm use example, although the graphical interface does quite roughly, but procedure itself has the very m
Update : 2008-10-13 Size : 44.83kb Publisher : 云中龙

Downloaded:0
Some source programs of encryption arithmetic.I don t know whether it is always existed or not.I will upload it if a lot of people have downloaded.
Update : 2008-10-13 Size : 275.5kb Publisher : 王军

The linearity shift register is the stream cipher important constituent, this procedure realizes this method.
Update : 2008-10-13 Size : 10.87kb Publisher : 王清华

Downloaded:0
a very handy and practical non-symmetric encryption algorithm, there are examples, complete source code.
Update : 2008-10-13 Size : 9.74kb Publisher : 乐天

Downloaded:0
encryption and decryption algorithms CECREITY5.0 this document without password can be extracted directly run
Update : 2008-10-13 Size : 33.91kb Publisher : 原宏智
« 1 2 ... .18 .19 .20 .21 .22 1623.24 .25 .26 .27 .28 ... 1660 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.