CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Crack Hack
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Crack Hack list
Sort by :
«
1
2
...
.86
.87
.88
.89
.90
991
.92
.93
.94
.95
.96
...
1660
»
Demo
Downloaded:0
The realization of DES algorithm, random number generator password, there are four kinds of DEMO
Date
: 2025-06-27
Size
: 83kb
User
:
李妍霏
cktx
Downloaded:0
Serial communications, can read and write data, including sending characters with CRC Checksum
Date
: 2025-06-27
Size
: 16kb
User
:
yxf
crc16
Downloaded:0
CRC16 source, the realization of CRC checksum, parallel CRC Checksum
Date
: 2025-06-27
Size
: 858kb
User
:
hent
my_ecc
Downloaded:0
ECC curves set the source code, C++ Prepared for our exchange
Date
: 2025-06-27
Size
: 54kb
User
:
苏钧儒
ClassLoader
Downloaded:0
Depth class loader, in-depth class loader type
Date
: 2025-06-27
Size
: 590kb
User
:
何震
DES
Downloaded:0
DES algorithm code file encryption tool, algorithm
Date
: 2025-06-27
Size
: 1.46mb
User
:
shf
checksum
Downloaded:0
Simulation validation and calculation procedures. That is, a section of text input, the output of its checksum value
Date
: 2025-06-27
Size
: 32kb
User
:
zhongjk
aefsdr
Downloaded:0
When you select xp system after a file encryption, once the system crashes, then encrypted copies of documents will no longer be opened. . . , When you still remember the system login name and password, then there is sav
Date
: 2025-06-27
Size
: 1.62mb
User
:
赵兴涛
jiajiemi
Downloaded:0
A full set of the most commonly used encryption and decryption procedures, including DES, RSA, MD5 and so on. . . . . The use of the environment: VC.net 2003 and above
Date
: 2025-06-27
Size
: 665kb
User
:
xiunai
CRCds
Downloaded:0
Described in detail the relevant principles of CRC and standards, particularly suitable for the development of hardware used language
Date
: 2025-06-27
Size
: 62kb
User
:
a
ss
Downloaded:0
Many cryptographic algorithm must randomly select a large prime numbers, this is Cryptography MILLER-RABIN algorithm to determine Primality.
Date
: 2025-06-27
Size
: 7kb
User
:
汪博峰
AES()
Downloaded:0
err
Date
: 2025-06-27
Size
: 497kb
User
:
liu
«
1
2
...
.86
.87
.88
.89
.90
991
.92
.93
.94
.95
.96
...
1660
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.