Welcome![Sign In][Sign Up]
Location:
Search - encrypt

Search list

[Crack HackEncrypt_And_Decrypt

Description: 基于异步长和密钥的文件加密解密,利用2进制方式读取文件,理论上可以加解密一切文件,但是具体应用要根据文件的不同而修改文件结束符-Based on asynchronous long file and key encryption and decryption. Reading zhe file by binary mode.In theory this software can used to encrypt and decrypt all kinds of files,but we should change the end operator according to different files
Platform: | Size: 1624064 | Author: 朱晓骏 | Hits:

[Crack Hack5108100100_TRANSPOSITIONCIPHER

Description: Transpositionchiper for encrypt and decrypt our messagge, so we can learn about how to encrypt and decrpyt by transpositionchipper
Platform: | Size: 15360 | Author: lisa | Hits:

[Crack HackRSA

Description: RSA算法是最著名的公开密码体制。基于大数分解的难度。其公开密钥和私人密钥是一对大素数的函数,从一个公开密钥和密文中恢复出明文的难度等价于分解两个大素数之积。算法过程:首先是设计密钥,然后是对消息加密,最后是对密文解密。-RSA algorithm is the most famous public cryptosystem. Based on the difficulty of large integer. Its public key and private key is a function of large prime numbers, from a public key and the ciphertext to recover the plaintext of the difficulty is equivalent to decompose the product of two large prime numbers. Algorithm process: first is to design the key, then encrypt the message, and finally to decrypt the ciphertext.
Platform: | Size: 1892352 | Author: 古狸 | Hits:

[Crack HackRSA

Description: RSA算法是最著名的公开密码体制。基于大数分解的难度。其公开密钥和私人密钥是一对大素数的函数,从一个公开密钥和密文中恢复出明文的难度等价于分解两个大素数之积。算法过程:首先是设计密钥,然后是对消息加密,最后是对密文解密。-RSA algorithm is the most famous public cryptosystem. Based on the difficulty of large integer. Its public key and private key is a function of large prime numbers, from a public key and the ciphertext to recover the plaintext of the difficulty is equivalent to decompose the product of two large prime numbers. Algorithm process: first is to design the key, then encrypt the message, and finally to decrypt the ciphertext.
Platform: | Size: 2835456 | Author: 古狸 | Hits:

[Crack HackProjectCriptare-v1.0-Final

Description: this is a project about security information containing how to encrypt a file
Platform: | Size: 9816064 | Author: Iosib Laura-Stefana | Hits:

[CA authjvencrypt

Description: source code to encrypt files with Visual Basic 6.0, please be further developed -source code to encrypt files with Visual Basic 6.0, please be further developed ..
Platform: | Size: 82944 | Author: Aminul Aprijal | Hits:

[Crack HackEnkripsi-a-Diskripsi

Description: source code to encrypt files with Visual Basic 6.0, please be further developed -source code to encrypt files with Visual Basic 6.0, please be further developed ..
Platform: | Size: 13312 | Author: Aminul Aprijal | Hits:

[Crack HackECCrypt

Description: ECC Cryptography, to encrypt and decrypt message-ECC Cryptography, to encrypt and decrypt message..
Platform: | Size: 3072 | Author: andy | Hits:

[Crack HackECField

Description: ECC Cryptography, to encrypt and decrypt message-ECC Cryptography, to encrypt and decrypt message..
Platform: | Size: 5120 | Author: andy | Hits:

[Crack HackECParam

Description: ECC Cryptography, to encrypt and decrypt message-ECC Cryptography, to encrypt and decrypt message..
Platform: | Size: 1024 | Author: andy | Hits:

[Crack HackECPoint

Description: ECC Cryptography, to encrypt and decrypt message-ECC Cryptography, to encrypt and decrypt message..
Platform: | Size: 4096 | Author: andy | Hits:

[Crack HackECTest

Description: ECC Cryptography, to encrypt and decrypt message-ECC Cryptography, to encrypt and decrypt message..
Platform: | Size: 3072 | Author: andy | Hits:

[Crack HackCRYPO-VIGENERE

Description: a console program in cryptography permet to encrypt and decrypt text using the method of Vigenere.
Platform: | Size: 3072 | Author: CBIR | Hits:

[Windows DevelopCRYPTOGRAPHIE-FICHIERS

Description: This C++ program can encrypt files written in binary, any time be careful because if you go wrong encryption key data may be lost.
Platform: | Size: 8192 | Author: CBIR | Hits:

[Crack HackCrypto

Description: is to encrypt any type of file with an encryption key to 100 characters, and sufit to drag the file to encrypt the executable
Platform: | Size: 9216 | Author: CBIR | Hits:

[CA authProject1

Description: it is a project on how to encrypt & decrypt any file using RSA algorithm
Platform: | Size: 1024 | Author: neha laskar | Hits:

[Crack HackEX

Description: NOR 加密兼容任何文件。NOR is compatible with any file encryption-NOR encrypt any file compatibility. NOR is compatible with any file encryption
Platform: | Size: 80896 | Author: 吴凯 | Hits:

[Crack HackHashLib

Description: HashLib,在涉及到加密解密算法的时候,都使用到加密库,这里提供的算法常用的经典算法,源码有CB和Delphi-HashLib, when it comes to encryption and decryption algorithms, it also uses to encrypt the database, the algorithm used here are classic algorithms, and Delphi source code with CB
Platform: | Size: 165888 | Author: 虾虾 | Hits:

[Crack HackRSAString

Description: 采用基于RSA的加密与解密算法实现对字符串的加密和解密的处理-Based on RSA encryption and decryption algorithms to encrypt and decrypt the string handling
Platform: | Size: 8192 | Author: 黄忠 | Hits:

[JSP/JavaStegoStick

Description: audio steganography file to encrypt text in audio file audio steganography file to encrypt text in audio file
Platform: | Size: 507904 | Author: mam | Hits:
« 1 2 ... 45 46 47 48 49 50»

CodeBus www.codebus.net