搜索资源列表
crypt.zip
- Delphi加密控件源码,包括对称钥匙加密控件和散列函数控件
dcpcrypt.zip
- Delphi加密控件源码,包括对称钥匙加密控件和散列函数控件
md5单向散列加密算法
- md5单向散列加密算法,此压缩包,包含完整调用DLL源码,PB格式.导入后直接可以应用.-md5 hash encryption algorithm, this compressed, includes a complete calling DLL source, PB format. After the direct import can apply.
keyed-md5
- 该加密算法是采用keyed MD5实现128位散列值,主要应用于MobileIP中的身份认证-The encryption algorithm is used to achieve keyed MD5 hash value of 128, which are mainly used within the Identity Authentication
SAM的散列存储加密解密算法
- 加密解密算法--SAM的散列存储加密解密算法分析-encryption and decryption algorithms -- SAM hash storage encryption and decryption algorithm analysis
SHA256
- sha256。256位的sha哈希函数算法,将明文进行散列加密处理。
sha1
- sha1摘要算法 简单易懂 测试已通过 将文件进行散列加密处理
SAM的散列存储加密解密算法以及SYSKEY的计算
- c语言编写的加密解密算法技术-prepared by the encryption and decryption algorithm
dcpcrypt.zip Delphi加密控件源码
- Delphi加密控件源码,包括对称钥匙加密控件和散列函数控件 ,Delphi encryption controls the source code, controls including the symmetrical key encryption and disperses the row letter numerical control
CryptAPI
- CryptAPI是微软在Windows系统中嵌入的一套公钥体质,提供对称加密、非对称加密、散列、签名等密码学的借口。Wcrypt2.dcu是把C语言的CryptAPI包翻译为Delphi中的借口文件。
sha3_Reference_Implementation
- SHA3参考实现算法,sha3是最新的哈希散列加密算法,它的前身是keccak算法-SHA3 reference algorithm, sha3 is the latest cryptographic hash algorithm, which is the predecessor of keccak algorithm
sha3_Optimized_32bit
- SHA3参考实现32bit优化算法,sha3是最新的哈希散列加密算法,它的前身是keccak算法-SHA3 reference implementation 32bit optimization algorithm, sha3 is the latest cryptographic hash algorithm, which is the predecessor of keccak algorithm
Skein_Reference_Implementation
- Skein参考算法的实现,尽管Skein没有通过最后一轮竞选,但它本身仍是一种优秀的散列加密算法-Skein reference alogrithm, although Skein didn t pass the last round competition, it s a excellent alogrithm for hash encryption
BLAKE_Optimized_32bit
- BLAKE优化的32bit的算法的实现,尽管Skein没有通过最后一轮竞选,但它本身仍是一种优秀的散列加密算法-BLAKE optimized 32bit alogrithm, although Skein didn t pass the last round competition, it s a excellent alogrithm for hash encryption
BLAKE_Reference_Implementation
- BLAKE的参考算法的实现,尽管Skein没有通过最后一轮竞选,但它本身仍是一种优秀的散列加密算法-BLAKE reference alogrithm, although Skein didn t pass the last round competition, it s a excellent alogrithm for hash encryption
JH_Optimized_64-bit
- JH优化的64bit的算法的实现,尽管Skein没有通过最后一轮竞选,但它本身仍是一种优秀的散列加密算法-JH optimized 64bit alogrithm, although Skein didn t pass the last round competition, it s a excellent alogrithm for hash encryption
JH_Reference-Implementation
- JH的参考算法的实现,尽管Skein没有通过最后一轮竞选,但它本身仍是一种优秀的散列加密算法-JH reference alogrithm, although Skein didn t pass the last round competition, it s a excellent alogrithm for hash encryption
Groestl_Optimized_32bit
- Groestl的优化的32bit的实现,尽管Skein没有通过最后一轮竞选,但它本身仍是一种优秀的散列加密算法-Groestl optimized 32bit alogrithm, although Skein didn t pass the last round competition, it s a excellent alogrithm for hash encryption
Groestl_Reference_Implementation
- Groestl的优化的32bit的算法的实现,尽管Skein没有通过最后一轮竞选,但它本身仍是一种优秀的散列加密算法-Skein reference alogrithm, although Skein didn t pass the last round competition, it s a excellent alogrithm for hash encryption
MD5散列函数的MATLAB代码
- 利用散列哈希函数对信息进行散列,产生一个定长的信息摘要,从而可实现消息的认证和完整性验证(Hash function is used to hash information to produce a certain length of information summary, which can realize message authentication and integrity verification.)