CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Crack Hack
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Crack Hack list
Sort by :
«
1
2
...
.28
.29
.30
.31
.32
733
.34
.35
.36
.37
.38
...
1660
»
Rijndael
Downloaded:0
Rijndael算法加解密 java版java版java版
Date
: 2025-06-27
Size
: 13kb
User
:
mmbb
AES_Encryption
Downloaded:0
AES encryption and decryption tool, use the c# development, you can encrypt and decrypt data.
Date
: 2025-06-27
Size
: 225kb
User
:
YANG Jun
RSA_C
Downloaded:0
use to encreption and decreption.the keyword is RSA.
Date
: 2025-06-27
Size
: 23kb
User
:
陶序刚
RSA
Downloaded:0
RSA encryption algorithm is a non-symmetric encryption algorithm. In public key encryption standards and electronic commerce is widely used in RSA. Source code includes the source code and dll files RSA.
Date
: 2025-06-27
Size
: 3.02mb
User
:
秀秀
RSA
Downloaded:0
With interface, in addition to digital signature functions
Date
: 2025-06-27
Size
: 2.18mb
User
:
丁丁
rs
Downloaded:0
RS coding is to calculate the information symbol code polynomial, divided by the check code generator polynomial after the remainder rs basically coding, including add, mul function, etc.
Date
: 2025-06-27
Size
: 1kb
User
:
久久
des
Downloaded:0
// des.cpp- modified by Wei Dai from: /* * This is a major rewrite of my old public domain DES code written * circa 1987, which in turn borrowed heavily from Jim Gillogly s 1977 * public domain code. I pretty much kept m
Date
: 2025-06-27
Size
: 19kb
User
:
模糊
jiajiemi
Downloaded:0
Encrypt and decrypt any file on the operation, if no encryption is automatically encrypted, to decrypt the encryption is automatically
Date
: 2025-06-27
Size
: 1kb
User
:
shil
90pjc52l
Downloaded:0
IDEA encryption device, capable of using, is not convenient, there is reference value
Date
: 2025-06-27
Size
: 6kb
User
:
hanpan
test2
Downloaded:0
key generation in DES algorithm
Date
: 2025-06-27
Size
: 22kb
User
:
web
Shamir
Downloaded:0
Shamir Scheme. Implmentació a cryptographic protocol based on the threshold scheme.
Date
: 2025-06-27
Size
: 41kb
User
:
knals
CryptDES
Downloaded:0
1. Through file encryption to prevent unauthorized users to view, to protect the purpose of the paper 2. Legitimate users enter the correct password to open and operate normally be 3. In addition to file encryption file
Date
: 2025-06-27
Size
: 349kb
User
:
玥儿
«
1
2
...
.28
.29
.30
.31
.32
733
.34
.35
.36
.37
.38
...
1660
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.