搜索资源列表
cryptix_src_3-1-2.zip
- 另一个使用java编写的加密通用算法包,含des,rsa,sha,md5,md4,md2,idea,blowfish等很多加密算法和密钥存储、签名等源码
ucd-snmp-4.2.6.tar
- ucd-snmp源代码,是net-snmp的早期版本,比net-snmp功能少些,包含了snmpv1,snmpv2,snmpv3,部分代码,还包含了md5、shA认真和DES与AES的加密功能 -ucd - snmp source code is net-snmp early versions, net-snmp function less, includes SNMPv1, snmpv2, SNMPv3, some code, but also the md5, shA seriously
sha2-1.0
- SHA-2 的代码实现-SHA-2 source implementation
sha-1.rar
- 本算法基于leon2协处理器接口标准,内含testbench,在modelsim中仿真通过,在ise9.2中综合及后仿真通过。,The algorithm is based on the leon2 co-processor interface standard, including testbench, ModelSim simulation in the adoption, in ise9.2 integrated and adopted after the simulation.
cryptix_src_3-1-2
- 另一个使用java编写的加密通用算法包,含des,rsa,sha,md5,md4,md2,idea,blowfish等很多加密算法和密钥存储、签名等源码- Another uses the java compilation the encryption general algorithm package, contains des, rsa, sha, md5, md4, md2, idea, blowfish and so on the very many encryption algor
libgringotts-1[1].2.1
- libGringotts是一个小型、易于使用的、完全线程的C语言库,最初为Gringotts开发。它的目的是将数据封闭在一个加密和压缩的文件中。它使用加密算法((RIJNDAEL 128/256, SERPENT, TWOFISH, CAST256, SAFER+, LOKI97, 用于加密的3DES, 以及哈希函数的SHA1和 RIPEMD-160)来确保数据尽可能安全,并允许用户对所有使用的加密、哈希函数和压缩算法有完全的控制。 -libGringotts is small, is easy
md5-sha2
- md5和sha-2的源码,并有相关例子。-md5 and sha-2 source code and have relevant examples.
PGP.Corporation.PGP.SDK.v3.7.2.ccrun.044998
- PGP SDK 包括大范围的标准加密、数字签名和编解码技术,以及各种网络安全协议执行程序。PGP SDK为开发人员提供同其他PGP产品核心相同的核加密功能。 PGP SDK技术说明:PGP SDK是我们的加密和密钥管理库的C接口,支持以下平台: · Windows 98, Millennium (ME), NT, 2000, and XP · Mac OS X · Linux x86 with 2.0.x kernel or later · Sun Solaris
CPyrit-CUDA-0.2.4.tar
- SHA-1 Cracker based on NVidia CUDA technology. Uses optimized SHA-1 implementation in C like Cuda language
sha2-1.0
- SHA-2 (Secure Hash Algorithm 2) hash function, written in C language.
sha1-c
- Test application for SHA
bank_safe_key
- 1,针对对金融行业密钥不是很熟悉的人 2,介绍金融密钥体系的结构和概念 3,介绍PIN,PIK,MAC,MAK,BMK,MK等 4,即个人密码,PINBLOCK,PIK(个人标识码密钥),报文鉴别码MAC 5,介绍了报文鉴别技术,MAC,MD5,SHA 6,介绍了PINBLOCK生成方法 7,商业银行加密机部署-1, for the financial industry, the key is not very familiar with the person 2, in
sha1
- Freeware implementation of the Secure Hashing Standard, defined in FIPS PUB 180-1, defines the Secure Hashing Algorithm (SHA-1). SHA-1 can be used to produce a message digest for a given message. Essentially, this is a 160-bit number that represents
sha1-0.2.tar
- his a C++ class that implements the Secure Hash Algorithm SHA-1. The purpose of the algorithm is to calculate a strong hash of given bit string. By "strong", we mean that it is very difficult to find a different bit string that results in the same ha
sha_algo
- SHA core cryptographic core
SHA256
- In cryptography, SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Se
sha2.tar
- code algoritma sha 1 hingga sha 2
SHA
- SHA-1 produces a message digest based on principles similar to those used by Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design.SHA-2 is a set of cryptographic hash functions (SHA-22
SHA
- 功能不全,安全哈希算法(Secure Hash Algorithm)主要适用于数字签名标准 (Digital Signature Standard DSS)里面定义的数字签名算法(Digital Signature Algorithm DSA)。对于长度小于2^64位的消息,SHA1会产生一个160位的消息摘要。当接收到消息的时候,这个消息摘要可以用来验证数据的完整性。在传输的过程中,数据很可能会发生变化,那么这时候就会产生不同的消息摘要。 SHA1有如下特性:不可以从消息摘要中复原信息;两个不
Steganography6
- Steganography in java using LSB technique for hiding message in PNG image & using AES and SHA-2 algorithm for encryption/decryption of message.