Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - cipher
Search - cipher - List
ceasar cipher encryption program in c language Kor
Update : 2024-05-04 Size : 193536 Publisher : ilseobshin

DL : 0
Caesar Cipher Encryption Coding
Update : 2024-05-04 Size : 1024 Publisher : kumar

MATLAB EXAMPLE CODE FOR POLYALPHABETIC CIPHER
Update : 2024-05-04 Size : 828416 Publisher : Syeda Sara Ahmed

基于隐藏密钥可以,将秘密信息msg嵌入到二值载体图像cover,算法简单,主要适合于将密文隐藏在BMP格式的文档里。-Key can be based on hidden, secret information will be embedded into the binary vector msg image cover, simple algorithm, mainly for the cipher text hidden in the BMP format documentation.
Update : 2024-05-04 Size : 4096 Publisher : sqt

DL : 0
Cipher Program that allows you to encrypt and decrypt messages using number codes to shift the letters.
Update : 2024-05-04 Size : 22528 Publisher : cloud

DL : 0
THis contains routing algorithms and certain cipher techniques using Matlab
Update : 2024-05-04 Size : 68608 Publisher : Asaph

DL : 0
It s a program writing in QT.
Update : 2024-05-04 Size : 2255872 Publisher : Aidos

DL : 1
基于C++Builder环境下的Autokey Cipher加密及解密源代码-Based on C++ Builder environment Autokey Cipher encryption and decryption source code
Update : 2024-05-04 Size : 355328 Publisher : 邵兴荣

DL : 0
ceaser cipher program in java
Update : 2024-05-04 Size : 1024 Publisher : saba

DL : 0
hill cipher n/w security java program
Update : 2024-05-04 Size : 1024 Publisher : saba

DL : 0
classical CEASER CIPHER Cryptography Technique implemented in C
Update : 2024-05-04 Size : 1024 Publisher : Pratik

DL : 0
Monoalphabetic cipher implemented in C with Graphics
Update : 2024-05-04 Size : 1024 Publisher : Pratik

A chaotic block cipher algorithm for image cryptosystems
Update : 2024-05-04 Size : 3587072 Publisher : Ahmed

DL : 0
This source code to create a vigenere cipher text and decript de text, also it has the kasiski method-This is source code to create a vigenere cipher text and decript de text, also it has the kasiski method
Update : 2024-05-04 Size : 1024 Publisher : juan

DL : 0
In cryptography, a Caesar cipher, also known as a Caesar s cipher, the shift cipher, Caesar s code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so on. The method is named after Julius Caesar, who used it to communicate with his generals. The encryption step performed by a Caesar cipher is often incorporated as part of more complex schemes, such as the Vigenà ¨re cipher, and still has modern application in the ROT13 system. As with all single alphabet substitution ciphers, the Caesar cipher is easily broken and in practice offers essentially no communication security. - In cryptography, a Caesar cipher, also known as a Caesar s cipher, the shift cipher, Caesar s code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so on. The method is named after Julius Caesar, who used it to communicate with his generals. The encryption step performed by a Caesar cipher is often incorporated as part of more complex schemes, such as the Vigenà ¨re cipher, and still has modern application in the ROT13 system. As with all single alphabet substitution ciphers, the Caesar cipher is easily broken and in practice offers essentially no communication security.
Update : 2024-05-04 Size : 1024 Publisher : adisbega

playfair cipher program in c language
Update : 2024-05-04 Size : 1024 Publisher : Ankitsri06

DL : 0
Caeser cipher and play fair cipher,wid example-Caeser cipher and play fair cipher,wid example....
Update : 2024-05-04 Size : 21504 Publisher : Nazeefa

使用Visual Basic实现个人专属的密码加密器-Caesar Cipher with VB
Update : 2024-05-04 Size : 1024 Publisher : 李宜儒

流密码和RC4算法的英文文献,对RC4算法有兴趣的朋友可以查看一下。-English literature of the RC4 And stream cipher algorithm 。people who is interested in RC4 algorithm can view it.
Update : 2024-05-04 Size : 182272 Publisher : niehaohong

DL : 0
A5 is a stream cipher. A5 is based on a combination of three linear feedback shift registers (LFSRs) with irregular clocking. It uses 64 bit keys. The register lengths are 19, 22, and 23. All the feedback polynomials are sparse. The output is the XOR of the three LFSRs.A5 uses variable clock control. Each register is clocked based on its own middle bit, XORed with the inverse threshold function of the middle bits of all three registers. Usually, two of the LFSRs clock in each round. It is used in GSM networks.
Update : 2024-05-04 Size : 2048 Publisher : Dip
« 1 2 3 4 5 67 8 9 10 11 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.