DSSZ
www.dssz.org
Search
Sign in
Create an account
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - cipher
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - cipher - List
【
Crack Hack
】
ceasar-C_code
DL : 0
ceasar cipher encryption program in c language Kor
Update
: 2024-05-04
Size
: 193536
Publisher
:
ilseobshin
【
Crack Hack
】
1_A_CAESAR
DL : 0
Caesar Cipher Encryption Coding
Update
: 2024-05-04
Size
: 1024
Publisher
:
kumar
【
matlab
】
Polyalphabetic-Encryption-decryption
DL : 0
MATLAB EXAMPLE CODE FOR POLYALPHABETIC CIPHER
Update
: 2024-05-04
Size
: 828416
Publisher
:
Syeda Sara Ahmed
【
matlab
】
Hidinginformationinbinaryimage
DL : 0
基于隐藏密钥可以,将秘密信息msg嵌入到二值载体图像cover,算法简单,主要适合于将密文隐藏在BMP格式的文档里。-Key can be based on hidden, secret information will be embedded into the binary vector msg image cover, simple algorithm, mainly for the cipher text hidden in the BMP format documentation.
Update
: 2024-05-04
Size
: 4096
Publisher
:
sqt
【
Crack Hack
】
Cipher
DL : 0
Cipher Program that allows you to encrypt and decrypt messages using number codes to shift the letters.
Update
: 2024-05-04
Size
: 22528
Publisher
:
cloud
【
matlab
】
Programs_pudn
DL : 0
THis contains routing algorithms and certain cipher techniques using Matlab
Update
: 2024-05-04
Size
: 68608
Publisher
:
Asaph
【
Linux-Unix
】
Cipher
DL : 0
It s a program writing in QT.
Update
: 2024-05-04
Size
: 2255872
Publisher
:
Aidos
【
Crack Hack
】
Autokey
DL : 1
基于C++Builder环境下的Autokey Cipher加密及解密源代码-Based on C++ Builder environment Autokey Cipher encryption and decryption source code
Update
: 2024-05-04
Size
: 355328
Publisher
:
邵兴荣
【
JSP/Java
】
Cipher
DL : 0
ceaser cipher program in java
Update
: 2024-05-04
Size
: 1024
Publisher
:
saba
【
CA auth
】
HillCipher
DL : 0
hill cipher n/w security java program
Update
: 2024-05-04
Size
: 1024
Publisher
:
saba
【
CA auth
】
CEASER
DL : 0
classical CEASER CIPHER Cryptography Technique implemented in C
Update
: 2024-05-04
Size
: 1024
Publisher
:
Pratik
【
Crack Hack
】
MONO1
DL : 0
Monoalphabetic cipher implemented in C with Graphics
Update
: 2024-05-04
Size
: 1024
Publisher
:
Pratik
【
Crack Hack
】
Amin-M._A-chaotic-block-cipher-algorithm-for-imag
DL : 0
A chaotic block cipher algorithm for image cryptosystems
Update
: 2024-05-04
Size
: 3587072
Publisher
:
Ahmed
【
Crack Hack
】
vigenere
DL : 0
This source code to create a vigenere cipher text and decript de text, also it has the kasiski method-This is source code to create a vigenere cipher text and decript de text, also it has the kasiski method
Update
: 2024-05-04
Size
: 1024
Publisher
:
juan
【
Other
】
CAESARCI
DL : 0
In cryptography, a Caesar cipher, also known as a Caesar s cipher, the shift cipher, Caesar s code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so on. The method is named after Julius Caesar, who used it to communicate with his generals. The encryption step performed by a Caesar cipher is often incorporated as part of more complex schemes, such as the Vigenà ¨re cipher, and still has modern application in the ROT13 system. As with all single alphabet substitution ciphers, the Caesar cipher is easily broken and in practice offers essentially no communication security. - In cryptography, a Caesar cipher, also known as a Caesar s cipher, the shift cipher, Caesar s code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so on. The method is named after Julius Caesar, who used it to communicate with his generals. The encryption step performed by a Caesar cipher is often incorporated as part of more complex schemes, such as the Vigenà ¨re cipher, and still has modern application in the ROT13 system. As with all single alphabet substitution ciphers, the Caesar cipher is easily broken and in practice offers essentially no communication security.
Update
: 2024-05-04
Size
: 1024
Publisher
:
adisbega
【
Crack Hack
】
playfair.c.tar
DL : 0
playfair cipher program in c language
Update
: 2024-05-04
Size
: 1024
Publisher
:
Ankitsri06
【
Crack Hack
】
ifsec-1
DL : 0
Caeser cipher and play fair cipher,wid example-Caeser cipher and play fair cipher,wid example....
Update
: 2024-05-04
Size
: 21504
Publisher
:
Nazeefa
【
CA auth
】
Caesar-Cipher-using--Visual-Basic
DL : 0
使用Visual Basic实现个人专属的密码加密器-Caesar Cipher with VB
Update
: 2024-05-04
Size
: 1024
Publisher
:
李宜儒
【
Crack Hack
】
stream-cipher-and-RC4
DL : 0
流密码和RC4算法的英文文献,对RC4算法有兴趣的朋友可以查看一下。-English literature of the RC4 And stream cipher algorithm 。people who is interested in RC4 algorithm can view it.
Update
: 2024-05-04
Size
: 182272
Publisher
:
niehaohong
【
Crack Hack
】
a51
DL : 0
A5 is a stream cipher. A5 is based on a combination of three linear feedback shift registers (LFSRs) with irregular clocking. It uses 64 bit keys. The register lengths are 19, 22, and 23. All the feedback polynomials are sparse. The output is the XOR of the three LFSRs.A5 uses variable clock control. Each register is clocked based on its own middle bit, XORed with the inverse threshold function of the middle bits of all three registers. Usually, two of the LFSRs clock in each round. It is used in GSM networks.
Update
: 2024-05-04
Size
: 2048
Publisher
:
Dip
«
1
2
3
4
5
6
7
8
9
10
11
...
50
»
DSSZ
is the largest source code store in internet!
Contact us :
1999-2046
DSSZ
All Rights Reserved.