搜索资源列表
fips180-2
- secure hash 标准文档,包括sha1,sha256,sha512-secure hash standard, sha1,sha256,sha512
sha1
- 散列算法sha-1 散列算法sha-1-THIS SOFTWARE IS PROVIDED BY ALLAN SADDI AND HIS CONTRIBUTORS ``AS IS * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOS
shanote
- Collision Search Attacks on SHA1 Xiaoyun Wang∗ Yiqun Lisa Yin† Hongbo Yu‡ February 13, 2005-Collision Search Attacks on SHA1 Xiaoyun Wang∗ Yiqun Lisa Yin† Hongbo Yu‡ February 13, 2005
IGBT
- 我平时编程和设计时常用的小工具集合。 功能: 1-8位校验和 2-16位校验和 3-计算CRC8 4-计算CRC16 5-计算CRC32 6-计算MD5 7-计算SHA1 -I usually used when programming and designing a small collection of tools. Function: 1-8 bit checksum 2-16 bit checksum 3- calculatin
Comparison-Based-Analysis-of-Different-Cryptograp
- Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of techn
SHA-1-Java
- SHA1算法的JAVA实现功能输出文件指纹的算法-SHA1 algorithm JAVA realization
sha1_v01
- sha1_testbench.v -- Testbench with vectors NIST FIPS 180-2 sha1_exec.v -- Top level sha1 module sha1_round.v -- primitive sha1 round dffhr.v -- generic parameterizable D-flip flop library Performance Analysis Performance equa
SHA1inC
- sh1的C++算法实现,内容详尽、案例充分-good sha1 text written in c++
ecc
- used to achieve the sha1 encryption algorithm, a very standardized format, a standard procedure