CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
CA auth
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
CA auth list
Sort by :
«
1
2
...
.39
.40
.41
.42
.43
144
.45
.46
.47
.48
.49
...
231
»
EllipticCurveDigitalSignature
Downloaded:0
Based on Elliptic Curve Digital Signature Based on Elliptic Curve Digital Signature
Date
: 2025-05-17
Size
: 881kb
User
:
林孑
authorize
Downloaded:0
Multiple module project authorized encryption algorithm
Date
: 2025-05-17
Size
: 4.63mb
User
:
jimmy
openssl-0.9.6l.tar
Downloaded:0
openssl sdkfjsfjsdklfjd
Date
: 2025-05-17
Size
: 2.08mb
User
:
heenze
jsp-MD5
Downloaded:0
jsp md5
Date
: 2025-05-17
Size
: 12kb
User
:
李智
2_AN1
Downloaded:0
code Cezar.very simple program showed algorithm codirovaniya
Date
: 2025-05-17
Size
: 665kb
User
:
Name
DES
Downloaded:0
It is a source code for DES algorithm in C++. it may not work but can give some help in your way of coding
Date
: 2025-05-17
Size
: 141kb
User
:
who
EC
Downloaded:0
ECC cryptography in java.
Date
: 2025-05-17
Size
: 14kb
User
:
jack8888
largenumberoperation
Downloaded:0
module dwin.lab.BigInt /+ version(Tango) { import tango.stdc.math import tango.stdc.stdlib import tango.stdc.string import tango.stdc.stdio } else { import std.c.math import std.c.stdlib import std.c.string import std.c.
Date
: 2025-05-17
Size
: 6kb
User
:
123456
Columnar_Encryption
Downloaded:0
C# simple program that encrypt and decrypt text using (columnar transposition) encryption
Date
: 2025-05-17
Size
: 40kb
User
:
emanD
rsa
Downloaded:0
Simple implementation of RSA encryption algorithm, c++ programming, simple and practical to run without any modifications
Date
: 2025-05-17
Size
: 223kb
User
:
joney
TEA
Downloaded:0
The encryption program is based on the famous TEA encryption algorithm, key length 128 bits, safe in the DES algorithm (56). The algorithm safe, simple, efficient, fast encryption and decryption, occupy very little memor
Date
: 2025-05-17
Size
: 2kb
User
:
YCLIU
inverse
Downloaded:0
The inversion operation of a finite field is commonly used in cryptography operations. The program provides effective, fast algorithm and program for computing the inverse problem in the finite field.
Date
: 2025-05-17
Size
: 1kb
User
:
YCLIU
«
1
2
...
.39
.40
.41
.42
.43
144
.45
.46
.47
.48
.49
...
231
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.