Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program CA auth

Search in result

CA auth list
Sort by :
« 1 2 3 4 56 7 8 9 10 ... 232 »
Downloaded:0
Japanese Game picture
Update : 2024-05-09 Size : 278kb Publisher : izul

Downloaded:0
aes128 encryption program, it can output the detailed information in each epoch.
Update : 2024-05-09 Size : 4kb Publisher : 李大好

The logistic map contains the code, and draw the image bifurcation diagram of logistic map and Lyapunov exponent, image and program results. The Lyapunov exponent in the study of power system bifurcation and chaotic moti
Update : 2024-05-09 Size : 25kb Publisher : 董大牛

Downloaded:0
NIST random number detection tool source code, according to the state secret inspection products pre detection random number test
Update : 2024-05-09 Size : 41.88mb Publisher : liuwenbo

Downloaded:0
One of the Quantum cryptology protocol, BB84 protocol implementation in Java.
Update : 2024-05-09 Size : 65kb Publisher : Raex

Downloaded:0
* dlls/rsaenh/rsaenh.c 0003 * RSAENH- RSA encryption for Wine
Update : 2024-05-09 Size : 42kb Publisher : zheng

Downloaded:0
The chap protocol clears
Update : 2024-05-09 Size : 22kb Publisher : 小明

Downloaded:0
This is a password cracking software, but time is longer, rape cracking method
Update : 2024-05-09 Size : 201kb Publisher : ye

Downloaded:0
BLAKE2 are cryptographic hash functions based on Dan Bernstein s Cha stream cipher, but a permuted copy of the input block, XORed with some round constants, is added before each Cha round. Like SHA-2, there are two varia
Update : 2024-05-09 Size : 486kb Publisher : Jonathan Young

Downloaded:0
Phelix 1 is a high-speed stream cipher with a built-in MAC func- tionality. It is efficient in both hardware and software. On current Pentium CPUs, Phelix has a per-packet overhead of less than 900 clocks, plus a per- by
Update : 2024-05-09 Size : 571kb Publisher : Jonathan Young

Downloaded:0
the hash algorithm of SM3,the basic standard of Chinese cryptographic algorithm SM3
Update : 2024-05-09 Size : 66kb Publisher : 张立四

Common decryption algorithms, including detailed examples and algorithmic annotations
Update : 2024-05-09 Size : 327kb Publisher : 张晓晓
« 1 2 3 4 56 7 8 9 10 ... 232 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.