Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .28 .29 .30 .31 .32 733.34 .35 .36 .37 .38 ... 1660 »
Downloaded:0
Rijndael算法加解密 java版java版java版
Date : 2025-06-27 Size : 13kb User : mmbb

Downloaded:0
AES encryption and decryption tool, use the c# development, you can encrypt and decrypt data.
Date : 2025-06-27 Size : 225kb User : YANG Jun

Downloaded:0
use to encreption and decreption.the keyword is RSA.
Date : 2025-06-27 Size : 23kb User : 陶序刚

Downloaded:0
RSA encryption algorithm is a non-symmetric encryption algorithm. In public key encryption standards and electronic commerce is widely used in RSA. Source code includes the source code and dll files RSA.
Date : 2025-06-27 Size : 3.02mb User : 秀秀

Downloaded:0
With interface, in addition to digital signature functions
Date : 2025-06-27 Size : 2.18mb User : 丁丁

Downloaded:0
RS coding is to calculate the information symbol code polynomial, divided by the check code generator polynomial after the remainder rs basically coding, including add, mul function, etc.
Date : 2025-06-27 Size : 1kb User : 久久

Downloaded:0
// des.cpp- modified by Wei Dai from: /* * This is a major rewrite of my old public domain DES code written * circa 1987, which in turn borrowed heavily from Jim Gillogly s 1977 * public domain code. I pretty much kept m
Date : 2025-06-27 Size : 19kb User : 模糊

Downloaded:0
Encrypt and decrypt any file on the operation, if no encryption is automatically encrypted, to decrypt the encryption is automatically
Date : 2025-06-27 Size : 1kb User : shil

Downloaded:0
IDEA encryption device, capable of using, is not convenient, there is reference value
Date : 2025-06-27 Size : 6kb User : hanpan

Downloaded:0
key generation in DES algorithm
Date : 2025-06-27 Size : 22kb User : web

Downloaded:0
Shamir Scheme. Implmentació a cryptographic protocol based on the threshold scheme.
Date : 2025-06-27 Size : 41kb User : knals

Downloaded:0
1. Through file encryption to prevent unauthorized users to view, to protect the purpose of the paper 2. Legitimate users enter the correct password to open and operate normally be 3. In addition to file encryption file
Date : 2025-06-27 Size : 349kb User : 玥儿
« 1 2 ... .28 .29 .30 .31 .32 733.34 .35 .36 .37 .38 ... 1660 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.