搜索资源列表
MD5
- 网络md5加密验证 可以通过此类验证网络md5加密算法-Network encryption md5 authentication can verify that the network such md5 encryption algorithm
labrc4
- 可以在ARM7-embest的板子上运行的RC4加解密算法,已经得到验证。-ARM7-embest can run on the board of the RC4 encryption algorithm, has been verified.
D_es
- 可以在ARM7-embest的板子上运行的DES加解密算法,已经得到验证。-ARM7-embest can run on the board of the DES encryption algorithm, has been verified.
md6_c
- 目前最新的MD6 Hash 算法源码,下一代的安全散列验证算法。-The new MD6 hash function,the next generation hash function.
fork256
- the hash function FORK-256,256位的安全散列验证算法,SHA-256的替代者。-the hash function FORK-256,256-bit secure hash authentication algorithm, SHA-256 replacement for him.
DES
- vb写的des加密解密源码及调用过程 已经验证-vb wrote des encryption and decryption process is called source code and authentication
borZoi-1.0.2
- 一个很全很强大的密码算法库,是一个大学研究机构编写的,可以用来作算法分析和仿真验证。-a crypto library includs various algorithm, such as aes, des ,ecc ,rsa ...
IS_Project1
- 这是一个文本加密、解密系统,提供了对称加密和非对称加密两种模式。此外,还实现了数字签名及其验证功能。-This is a text encryption, decryption system provides symmetric encryption and asymmetric encryption mode. In addition, implementation of digital signature and the authentication function.
DES
- 本DES算法,使用了效率很高的C完成。目前,国内知名企业的POS终端中,单DES算法,均是采用这个函数完成。函数经本站验证过,可以放心使用。-The DES algorithm, the use of highly efficient C-complete. At present, the domestic well-known enterprises in the POS terminal, single-DES algorithms are supported by the completi
test_md5
- 计算任意字符串MD5散列值的程序,已经经过验证可用。-Calculation of arbitrary string MD5 hash value of the procedure, has been available to verify.
test_cast5
- CAST5加密算法,程序中带验证程序,验证通过。-CAST5 encryption algorithm process with the verification process, verification through.
test_twofish
- TWOFISH加密算法,带验证程序,验证通过-Twofish encryption algorithm, with the verification process, verification through
test_blowfish
- BLOWFISH加密算法,带验证程序,验证通过-BlowFish encryption algorithm, with the verification process, verification through
IndentityTest
- U盘身份识别软件,包括U盘的写入,加密算法的使用,验证等部分-U disk identity recognition software, including the U disk write, the use of encryption algorithm, authentication and other parts of
sha256_512
- Verilog实现的SHA256/SHA512算法,已仿真和验证-Verilog implementation of SHA256/SHA512 algorithm, simulation and verification has been done.
krbtest
- 基于openssl开发的,加解密、签名验证和hash工具-Developed based on the openssl, encryption and decryption, signature verification and hash tools
sha
- sha加密算法实现,经过FPGA验证的!-sha encryption algorithm, after FPGA validation!
crc
- CRC校验码的实现,校验码6位,寄存器串行实现方式,经项目实际验证正确-CRC Check Code realization Check 6, register serial ways, the right to verify the actual project
Sha1
- Sha1算法源代码,经验证绝对准确 Sha1算法源代码,经验证绝对准确-sha1
sha
- 内带3个sha1的C源码。经验证都可用。在我们项目中,已经用于验证SHA1的verilog-With three within the C source code sha1. Experience certificate are available. In our project, has been used to validate SHA1 of verilog