C# |
4 Dec 2011
Updated: 4 Dec 2011
Rating: 4.00/5
Votes: 2
Popularity: 1.20
Licence: GPL3
Views: 22,000
Bookmarked: 7
Downloaded: 0
Algorithm that performs an encryption in an anagram-like manner
|
C# 4.0 |
11 Feb 2012
Updated: 11 Feb 2012
Rating: 5.00/5
Votes: 2
Popularity: 1.51
Licence: GPL3
Views: 34,853
Bookmarked: 4
Downloaded: 0
The basic binary operations (AND, OR, XOR, NOT, ShiftLeft, ShiftRight) applied to byte arrays, made faster thanks to the use of parallelism combined with the use of pointers.
|
Cryptography |
7 May 2022
Updated: 8 May 2022
Rating: 5.00/5
Votes: 3
Popularity: 2.39
Licence: GPL3
Views: 5,485
Bookmarked: 3
Downloaded: 70
Creation of a substitution box starting from a key and using it in a direct substitution cipher
|
Encryption |
19 Jun 2012
Updated: 20 Jun 2012
Rating: 4.52/5
Votes: 6
Popularity: 3.52
Licence: GPL3
Views: 46,634
Bookmarked: 14
Downloaded: 1,046
Encription algorithm that uses mandelbrot fractal to expand the encryption key
|
|
21 Jan 2013
Updated: 28 Jan 2013
Rating: 4.83/5
Votes: 29
Popularity: 6.84
Licence: GPL3
Views: 91,659
Bookmarked: 90
Downloaded: 3,930
Encrypt your C# classes and compile them during run-time (hiding their code in the exe file).
|