Download Shareware and Freeware Software for Windows, Linux, Macintosh, PDA

line Home  |  About Us  |  Link To Us  |  FAQ  |  Contact

Serving Software Downloads in 956 Categories, Downloaded 50.357.839 Times

Cyberpunks Role In Cryptography freeware
Filter: All | Freeware | Demo
 

Cyberpunks Role In Cryptography

1 2 3 4 5 > 

A 32 point FFT in embedded MATLAB using fixed point arithmetic DFT plays important role in DSP and used in wide variety of applications like correlation and spectral analysis. Understanding quantization errors in its computation is an important aspect of its design either for s/w or h/w implementation.A complex DFT of N points has N complex (4N real)...



Platforms: Matlab


Added: May 10, 2013 | Visits: 448

Restricted Text Users can insert [restrict:roles=] and [/restrict] tags into their text, and anything in-between these will only be visible to users who are a member of a role in the comma-separated list. The module is not capable of supporting role separation by ", " (comma and space).InstallationUnpack in your...





Platforms: Windows, Mac, *nix, PHP, BSD Solaris

License: Freeware Download (54): Restricted Text Download

Added: February 12, 2010 | Visits: 1.534

X-Moto X-Moto is a challenging 2D motocross platform game, where physics play an all important role in the gameplay. You need to control your bike to its limit, if you want to have a chance finishing the more difficult of the challenges. First youll try just to complete the levels, while later youll...


Platforms: *nix

License: Freeware Size: 2.6 MB Download (236): X-Moto Download

Released: July 16, 2012  |  Added: July 16, 2012 | Visits: 597

Castlevania - The New Generation The role in game which you will play is that of John Morris or Eric Lecarde, both of whom are on a mission to slay Dracula and send him back to his gravesite.The game is six levels long and starts in Castle Dracula in Romania and takes you across many famous European settings like the Leaning...


Platforms: Windows

License: Freeware Size: 1.23 MB Download (48): Castlevania - The New Generation Download

Released: August 13, 2012  |  Added: August 13, 2012 | Visits: 289

The Custom-TF Improvement Project Custom-TF is a multiplayer Quake modification, allowing players to customize their role in the game to be whatever they want.


Platforms: Windows, Mac, Linux

License: Freeware Size: 608.65 KB Download (44): The Custom-TF Improvement Project Download

Released: September 21, 2012  |  Added: September 21, 2012 | Visits: 497

vH Crypto API for Java Being that Sun's Java Cryptography Extension (JCE) is not well-documented and has a steep learning curve, the vH Crypto API for Java is being created to abstract the procedures which are commonly used in cryptography.


Platforms: Windows, Mac, Linux

License: Freeware Size: 8.12 KB Download (49): vH Crypto API for Java Download

Added: April 06, 2013 | Visits: 450

Transform Tensor FUNCTIONotr = transform(itr,tmx)PARAMETERSotr = output tensor, after transformation; has the same dimensions as the input tensoritr = input tensor, before transformation; should be a 3-element vector, a 3x3 matrix, or a 3x3x3x... multidimensional array, each dimension containing 3 elementstmx =...


Platforms: Matlab

License: Freeware Size: 10 KB Download (45): Transform Tensor Download

Added: August 13, 2013 | Visits: 313

KeyMingler In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...


Platforms: Mac

License: Freeware Size: 18.29 MB Download (39): KeyMingler Download

Added: September 11, 2013 | Visits: 375

gurbas In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...


Platforms: Mac

License: Freeware Size: 12.35 MB Download (34): gurbas Download

Added: September 27, 2013 | Visits: 408

nulis In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...


Platforms: Mac

License: Freeware Size: 5.32 MB Download (38): nulis Download

Added: August 13, 2013 | Visits: 323

Vakar In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...


Platforms: Mac

License: Freeware Size: 5.16 MB Download (38): Vakar Download

Added: September 04, 2013 | Visits: 430

Matches and Matrimony: A Pride and Prejudice Tale Help a Bennet sister find a husband as you take a starring role in Jane Austen???*a*?s most popular novels in Matches & Matrimony! Will you pursue Mr. Bingley, whose good nature has already endeared him to your sister, or perhaps Mr. Darcy, the famous protagonist from Pride and Prejudice? The...


Platforms: Mac

License: Freeware Size: 65.03 MB Download (37): Matches and Matrimony: A Pride and Prejudice Tale Download

Added: July 24, 2013 | Visits: 382

Role Ownership This module allows users to set the ownership of a node to a role with full access (view, update, delete). By default the permission will be set to the role of the user. In case the user has more than one role, there will be a list of roles to choose from. You can also add permission to user that...


Platforms: PHP

License: Freeware Size: 10 KB Download (47): Role Ownership Download

Added: November 20, 2010 | Visits: 1.156

The Blowfish The Blowfish cipher in C and i386 assembler. In cryptography, Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products. While no effective cryptanalysis of Blowfish has been found to date, more...


Platforms: *nix

License: Freeware Size: 12.29 KB Download (180): The Blowfish Download

Released: August 25, 2012  |  Added: August 25, 2012 | Visits: 931

MB Travel Astrology MB Travel Astrology finds your travel profile based on your sun sign in Western Astrology. This shows more about your travel preferences and the kind of travel adventures you would like to go out on. 'Travel Astrology' can help you understand your travel preferences depending on your zodiac sign....


Platforms: Windows

License: Freeware Size: 1.55 MB Download (66): MB Travel Astrology Download

Released: June 21, 2012  |  Added: June 21, 2012 | Visits: 395

impromptu for Mac OS An OS X programming environment for composers, sound artists, VJs and graphic artists with an interest in live or interactive programming. Impromptu is a Scheme language environment, a member of the Lisp family of languages. Time plays a major role in the Impromptu environment allowing accurate...


Platforms: Mac

License: Freeware Size: 10 MB Download (567): impromptu for Mac OS Download

Released: June 14, 2012  |  Added: June 14, 2012 | Visits: 499

Crouching cow mountain screensaver In this screensaver, you will see rustic scenery of crouching cow mountain. Just down the mountain is the biggest production base for pig leather in China. It looks tranquil inside the town, but it is the place where multi-billion dollars worth of business is done every year. The supply and...


Platforms: Windows

License: Freeware Size: 948 KB Download (56): Crouching cow mountain screensaver Download

Released: January 08, 2013  |  Added: January 08, 2013 | Visits: 707

MB Western Astrology Planetary Dignities MB Western Astrology Planetary Dignities shows the rulership of the planets in the signs they are present in based on Western Astrology. Each planet may or may not be compatible with the sign it is present in. The placements effects the expression of the characteristics reflected by the planet....


Platforms: Windows

License: Freeware Size: 1.3 MB Download (539): MB Western Astrology Planetary Dignities Download

Released: January 12, 2013  |  Added: January 12, 2013 | Visits: 764

MB Western Astrology Planets And Houses MB Western Astrology Planets And Houses shows the positions of the planets in the twelve houses in your natal chart based on Western Astrology. The distribution of the planets in the different houses play an important role in interpreting the birth chart of an individual. MB Western Astrology...


Platforms: Windows

License: Freeware Size: 1.62 MB Download (534): MB Western Astrology Planets And Houses Download

Added: July 27, 2013 | Visits: 461

The Blowfish cipher The Blowfish cipher in C and i386 assembler. In cryptography, Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products. While no effective cryptanalysis of Blowfish has been found to date, more...


Platforms: *nix

License: Freeware Size: 10.24 KB Download (40): The Blowfish cipher Download

1 2 3 4 5 >