Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - Crypto
Search - Crypto - List
Use the crypto module to encrypt sensitive data using a key you generated yourself... This is quite handy with INI files which you can use to get and set data for you applications. You can also check out some dates related to passwords and expiry dates. Send emails using Microsoft Email client. No need to cater for SMTP nor Exchange mail accounts. If you can send email with your outlook, you can send email with your application. Get some windows info with the sysinfoctrls member.
Update : 2024-05-02 Size : 4096 Publisher : Gawie Greef

DL : 0
Crypto Syatem Part of encrypton and decryption
Update : 2024-05-02 Size : 4096 Publisher : devu

DL : 0
tools for processing crypto in matlab written inc c++ ebook for
Update : 2024-05-02 Size : 31744 Publisher : mehdi

DL : 0
String hanlding library. Functions for crypto, token etc
Update : 2024-05-02 Size : 257024 Publisher : Eyder

TwoCrypt2提供了一个带有可选加密功能的加解密工具。-twocrypt provides a crypto tool with a deniable encryption option
Update : 2024-05-02 Size : 51200 Publisher : 徐翔

DL : 0
Crypt / DeCrypt Class in C#.-Crypt/DeCrypt Class in C#.
Update : 2024-05-02 Size : 2048 Publisher : Pep

Crypto code for the Elliptic Curce Cryptography
Update : 2024-05-02 Size : 182272 Publisher : serhat

DL : 0
I try to make crypto algorithm that called BCA-64 and try to code it in C language
Update : 2024-05-02 Size : 16384 Publisher : Bayu

AES specification, a crypto algorithm.
Update : 2024-05-02 Size : 222208 Publisher : dainv

DL : 0
AES algorithm, a crypto algorithm :)
Update : 2024-05-02 Size : 244736 Publisher : dainv

DL : 0
The AES crypto algorithms specification.
Update : 2024-05-02 Size : 208896 Publisher : dainv

use the base function Crypto API for crypt/decrypt message and view cryptoproviders in your system.(console application)
Update : 2024-05-02 Size : 2048 Publisher : alex

DL : 0
There is a DES crypto programm. Only for lab. To make some mesurements. And some Heming scheme s in a EWB (Electronic work Bench)
Update : 2024-05-02 Size : 415744 Publisher : Dimon

DL : 0
3 Examples of basic Crytprography and BruteForce approcaces
Update : 2024-05-02 Size : 39936 Publisher : Chris

a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES.
Update : 2024-05-02 Size : 418816 Publisher : Hassan Abdelaziz

DL : 0
this file contains different security written in c-this file contains different security written in c++
Update : 2024-05-02 Size : 1075200 Publisher : souna

OTFE for PDA, crypto partition on windows ce
Update : 2024-05-02 Size : 1086464 Publisher : busa

DL : 0
用JAVA函数实现文件的加密解密。加密解密分别使用不同函数进行实现-JAVA files function with the encryption and decryption. Encryption and decryption functions, respectively, to achieve different
Update : 2024-05-02 Size : 84992 Publisher : liuby

crypto api files for security
Update : 2024-05-02 Size : 36982784 Publisher : logu

DL : 0
Crypto++库,已经在VS2005上编译出库文件cryptlib.lib,可以直接拿去用。-Crypto++ library, already been compiled in VS2005 on the library file, you can use directly.
Update : 2024-05-02 Size : 8506368 Publisher : yj
« 1 2 ... 5 6 7 8 9 1011 12 13 14 15 ... 27 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.