搜索资源列表
sha(1,256,384,512)
- 一个sha 哈希密码支撑算法系列的程序 包括了sha1,sha256,sha384和sha512算法-a password support Hash Algorithm series of procedures including sha1, SHA256, SHA384 and SHA512 Algorithm
FreeOTFE_2_00_src
- 文件驱动加密,功能强大,可产生加密分区,支持AES,MD2,MD4,MD5MD2, MD4, MD5, RIPEMD-128, RIPEMD-160, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512.
SHAProj
- 以前发的那个只实现了SHA-1, 现在补全了, sha-160, sha-224, sha-256, sha-384, sha-512
sha 加密算法 C实现
- 包括 sha1 sha-224,sha-256,sha-384,sha-512 c++测试工具
cryptix-jce-20050328-snap
- 包含各種加密演算法和Digital Signatures(MD2 MD4 MD5 RIPEMD-128 RIPEMD-160 SHA-0 SHA-1 SHA-256 SHA-384 SHA-512 Tiger)-THIS SOFTWARE IS PROVIDED BY THE CRYPTIX FOUNDATION LIMITED ``AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
FileVerifier
- FileVerifier++是一款Windows功能软件,它用于计算文件的hash值(算法包括:CRC32,MD5,SHA-1,SHA-256/224/384/512,WHIRLPOOL,以及RIPEMD-128/160/256/320)。支持的hash文件格式包括MD5SUM .MD5, SFV, BSD CKSUM, 以及其他格式。-FileVerifier++ Software is a Windows feature, it used to calculate the hash valu
encryption_test
- 实现通信过程中的数据加密(AES, DES, SHA-256,SHA-384,SHA512, RSA)。 测试加解密效率等-To achieve communication in the process of data encryption (AES, DES, SHA-256, SHA-384, SHA512, RSA). Encryption and decryption efficiency test
sha1
- SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-51
sha-1
- 用SHA算法实现对任意文件的hash摘要,并且把hash摘要值(至少为160bit)存入另一个文件,形如: hash inputfile hashvaluefile 说明:SHA算法的实现至少为160bit,或者可以选择256,384或者512的,可以查阅相关资料,按照标准来实现(hash的算法是否正确,可以和网上的标准算法对比,用相同的输入看是否能够得到相同的输出)控制台编程: int main(int argc, char *argv[ ]) -Programme f
MD_SDK
- C++源码实现完整讯息摘要类别加解密方法,包函MD4 - both 128 bits and 256 bits, MD5, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, SHA-1, SHA-256, SHA -384, SHA-512, HAVAL SERIES及BASE 64-C++ source code to achieve a complete summary of categories of message encryption an
sha384
- sha-384散列函数 sha-384散列函数-THIS SOFTWARE IS PROVIDED BY ALLAN SADDI AND HIS CONTRIBUTORS ``AS IS * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PU
SHAProj
- 本程序包括一些常用的加密算法,包括:SHA-1,SHA-224,SHA-384,SHA-512等-This process includes some commonly used encryption algorithms, including: SHA-1, SHA-224, SHA-384, SHA-512, etc.
SHA256
- In cryptography, SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Se
several-hash-functions-in-php
- php中几种哈希函数的对比,包含MD4、MD5、SHA-1、SHA-256、SHA-384以及SHA-512-php several hash functions in contrast, contains of MD4, MD5, SHA-1, SHA-256, SHA-384 and SHA-512
12118029sha(1-256-384-512)
- SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-512
LongDigest
- Base class SHA-384 and SHA-512 for Andriod.
Optimum-Architecture-of-SHA-256-(384-512)-for-Har
- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations
LongDigest
- Base class for SHA-384 and SHA-512.
SHA
- SHA-1 produces a message digest based on principles similar to those used by Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design.SHA-2 is a set of cryptographic hash functions (SHA-22
sha256
- SHA 252 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the compu