Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program Crack Hack

Search in result

Crack Hack list
Sort by :
« 1 2 ... .46 .47 .48 .49 .50 951.52 .53 .54 .55 .56 ... 1660 »
Downloaded:0
VB had come with the implementation, AES encryption algorithm implementation, this algorithm covers the essence of AES
Date : 2025-06-28 Size : 9kb User : 吕虎猛

Downloaded:0
c# DES file encryption file encryption c# DES
Date : 2025-06-28 Size : 4kb User : liuzhou

Downloaded:0
Give a lot of file encryption technology, which is divided into different levels to fit the needs of different occasions. Give here the most simple file encryption technology, which adopts the document-by-byte XOR with t
Date : 2025-06-28 Size : 1kb User : 鲨鱼

Downloaded:2
* * DESCRIPTION * Base64 processes input in 24bit chunks by converting each chunk into 4 * bytes of output. It does so by splitting input into four 6bit groups and * using these as indexes in the following substitution t
Date : 2025-06-28 Size : 1kb User : JerryJiang

Downloaded:0
AES implementation of the C language source code
Date : 2025-06-28 Size : 25kb User : bianxiaoke

Downloaded:0
* This program is free software you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation either version 2, or (at your option) any * late
Date : 2025-06-28 Size : 1kb User : xsw

Downloaded:0
des encryto and decryto minides Crypt_Decrypt algrithms
Date : 2025-06-28 Size : 194kb User : wxg

Downloaded:0
CRC-test(edit with Visual C++)
Date : 2025-06-28 Size : 11kb User : 江峰

Downloaded:0
RSA algorithm, the use of the environment VC, can achieve the RSA encryption and decryption functions.
Date : 2025-06-28 Size : 243kb User : YZQ

Downloaded:0
EVRC complete source compression decompression algorithms, with a simple example program.
Date : 2025-06-28 Size : 615kb User : Jason

Downloaded:0
Machine to make use of multi-layer perceptron xor Category
Date : 2025-06-28 Size : 2kb User : yenlun

Downloaded:0
Classical cryptographic algorithm in a single table substitution cipher, transposition cipher, Vigenere cipher. Algorithm is relatively simple, way to use the command. Can be randomly generated and the key explicitly.
Date : 2025-06-28 Size : 2kb User : baichi123
« 1 2 ... .46 .47 .48 .49 .50 951.52 .53 .54 .55 .56 ... 1660 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.