Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - cipher
Search - cipher - List
这是一个通过调用Java自带的DES加密解密函数做的程序,有有好的界面,可以对文件进行加密解密。在打开需要加密或者解密的文件之后,需要新建.txt文件以保存加密或者解密的文件,源文件不受影响。程序中设置了过滤器,只能看到txt文件或者普通文件夹-This is a built-in Java by calling DES encryption and decryption functions do the procedure, there is a good interface, can file encryption and decryption. After opening the need to encrypt or decrypt files, you need to create a .txt file to save the encryption or decryption of files, source files are not affected. Program set up filters, only to see ordinary txt file or folder
Update : 2024-05-18 Size : 4096 Publisher : wangxiaochen

DL : 0
Propagating Cipher Block Chaining mode.
Update : 2024-05-18 Size : 2048 Publisher : muerzsb

DL : 0
sdc源码,在ubuntu12.4中编译成功,用于对linux中可执二进制行文件的加密。执行make会弹出编译选项,编译成功后会生成sdc,例如:可执行二进制文件为hello,执行./sdc hello 后输入密码,会生成加密文件hello.sdc ,执行./hello.sdc,输入解密密码会生成hello。 -SDC, or Self Decrypting Binary Generator, creates self decrypting binaries for common operating systems and architectures. The target file is encrypted using Blowfish in Cipher text Feedback Mode (CFB) and appended to an executable which reads itself and attempts to decrypt the appended data when it is run. Targets: Linux x86 (ELF), Windows x86 (PE-COFF), OpenBSD x86 (ELF), OpenBSD arm (ELF), OpenBSD sparc64 (ELF), FreeBSD x86 (ELF), NetBSD x86 (ELF), Solaris sparc (ELF).
Update : 2024-05-18 Size : 885760 Publisher : jonson

Twofish Cipher 8-way parallel algorithm (AVX x86_64).
Update : 2024-05-18 Size : 3072 Publisher : ghtnlo

DL : 0
Glue Code for the asm optimized version of the AES Cipher Algorithm.
Update : 2024-05-18 Size : 1024 Publisher : hknanzan

DL : 0
s390 implementation of the AES Cipher Algorithm.
Update : 2024-05-18 Size : 5120 Publisher : toncingsg

DL : 0
AES cipher for ARMv8 with Crypto Extensions.
Update : 2024-05-18 Size : 7168 Publisher : bmzfjen

DL : 0
core AES cipher using ARMv8 Crypto Extensions.
Update : 2024-05-18 Size : 3072 Publisher : dzdongg

DL : 0
A means of attaining secure communications over insecure channels • Protection of data by transformations that turn useful and comprehensible plain text into scrambled and meaningless cipher text under control of secret keys- A means of attaining secure communications over insecure channels • Protection of data by transformations that turn useful and comprehensible plain text into scrambled and meaningless cipher text under control of secret keys
Update : 2024-05-18 Size : 61440 Publisher : tamer

DL : 0
software implementation of a cryptosystem, carrying out encoding and decoding system, Caesar cipher -software implementation of a cryptosystem, carrying out encoding and decoding system, Caesar cipher
Update : 2024-05-18 Size : 41984 Publisher : pavel

Camellia Cipher Algorithm (x86_64).
Update : 2024-05-18 Size : 2048 Publisher : wuiguedz

DL : 0
DES Cipher algorithm implementation using java
Update : 2024-05-18 Size : 12288 Publisher : saif ullah

DL : 0
Hill Cipher algorithm java implementation
Update : 2024-05-18 Size : 13312 Publisher : saif ullah

DL : 0
Friedman test C++ vigenere cipher
Update : 2024-05-18 Size : 2048 Publisher : Zzzzzz

DL : 0
Friedman test C++ vigenere cipher 2 example
Update : 2024-05-18 Size : 1024 Publisher : Zzzzzz

DL : 0
Friedman test C++ vigenere cipher example 3
Update : 2024-05-18 Size : 2048 Publisher : Zzzzzz

DL : 0
The AES algorithm has implemented for bitplane images using RC4 algorithm.RC4 is called as Rivest Cipher 4 for encrypt and decrypt an image.It is used here preserve the image content data hacking. Here, the implemented code has tested with MATLAB2010a for Default MATLAB grayscale images.-The AES algorithm has implemented for bitplane images using RC4 algorithm.RC4 is called as Rivest Cipher 4 for encrypt and decrypt an image.It is used here preserve the image content data hacking. Here, the implemented code has tested with MATLAB2010a for Default MATLAB grayscale images.
Update : 2024-05-18 Size : 1024 Publisher : yuvaraj

thanks for my life to you god
Update : 2024-05-18 Size : 4096 Publisher : ariefmilanisti

Salsa20: Salsa20 stream cipher algorithm.
Update : 2024-05-18 Size : 2048 Publisher : kyqkgou

DL : 0
substitution cipher is the method of encoding in which unit of plain text are replaced by cipher text. Monoalphabetic cipher uses a fixed message over entire message.A monoalphabetic cipher uses fixed substitution over the entire message.The monoalphabetic substitution takes a letter of an alphabet and substitutes it with another letter, this way a ciphertext is generated. The way of converting is fixed. A character of the plaintext will be replaced by the same ciphertext character, during the entire ciphertext. There is no additional key. The only way of security is to keep the substitution-table secret. A popular example for the monoalphabetic substitution is the caesar cipher.
Update : 2024-05-18 Size : 9216 Publisher : mathi
« 1 2 ... 43 44 45 46 47 4849 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.