2020-02-09All articles/The InternetThe contents section Cryptographic algorithms Hash-Mask algorithm for confidential data exchange One of the implementations of the Hash-Mask algorithm. Browser off-line coding Another implementation of the algorithm: data is transmitted to the server Ukrainian algorithm to encrypt and decrypt data Module for secret data transmission UAcoder Testing of the algorithm and module UAcoder About advertising and advertising technologies A banner for us to build and live helps New technology advertising When you cry tax What is active is