Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - HAVAL
Search - HAVAL - List
a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.-a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.
Update : 2008-10-13 Size : 378.96kb Publisher : 刘永

a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.-a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.
Update : 2025-02-17 Size : 379kb Publisher : 刘永

MD2、MD3、SHA1、SHA256、SHA384、SHA512、HAVAL128、HAVAL160、HAVAL192、HAVAL224、HAVAL256、GOST、TIGER128、TIGER160、TIGER192、RIPEMD128、RIPEMD160、CRC32、CRC32B、ADLER32多种算法-MD2, MD3, SHA1, SHA256, SHA384, SHA512, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, GOST, TIGER128, TIGER160, TIGER192, RIPEMD128, RIPEMD160, CRC32, CRC32B, ADLER32 a variety of algorithms
Update : 2025-02-17 Size : 231kb Publisher : bai

DL : 0
--- --- ---haval代码--- --- --200种加密算法中的一种------------- haval------------ 200 species of an encryption algorithm
Update : 2025-02-17 Size : 4kb Publisher : vdsvds

DL : 0
C++源码实现完整讯息摘要类别加解密方法,包函MD4 - both 128 bits and 256 bits, MD5, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, SHA-1, SHA-256, SHA -384, SHA-512, HAVAL SERIES及BASE 64-C++ source code to achieve a complete summary of categories of message encryption and decryption methods, including letter MD4- both 128 bits and 256 bits, MD5, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, SHA-1, SHA-256, SHA-384, SHA-512, HAVAL SERIES and BASE 64
Update : 2025-02-17 Size : 32kb Publisher : william

07 One-Way-Hash HAVAL
Update : 2025-02-17 Size : 97kb Publisher : Sableng

Delphi helper unit for DEC cryptographic library. Allows easyly to get text hash of input for Hash and CRC algorithms. Includes fixes for Haval (all rounds/sizes). Also included is sample program using helper unit for demonstation pursposes.
Update : 2025-02-17 Size : 285kb Publisher : Testeris

DL : 0
haval算法C++源代码,广泛应用于加密摘要和信息安全领域-haval C++ source code, haval is widely used in encry and info security application
Update : 2025-02-17 Size : 4kb Publisher : ruoxxx

MD5算法具有以下特点: 1、压缩性:任意长度的数据,算出的MD5值长度都是固定的。 2、容易计算:从原数据计算出MD5值很容易。 3、抗修改性:对原数据进行任何改动,哪怕只修改1个字节,所得到的MD5值都有很大区别。 4、强抗碰撞:已知原数据和其MD5值,想找到一个具有相同MD5值的数据(即伪造数据)是非常困难的。 MD5的作用是让大容量信息在用数字签名软件签署私人密钥前被"压缩"成一种保密的格式(就是把一个任意长度的字节串变换成一定长的十六进制数字串)。除了MD5以外,其中比较有名的还有sha-1、RIPEMD以及Haval等。(The MD5 algorithm has the following characteristics: 1: compression of arbitrary length data, calculate the MD5 value of the length is fixed. 2, easy to calculate: from raw data to calculate the value of MD5 is very easy. 3, anti modification: any modifications to the original data, even if only to modify 1 bytes, the MD5 values are very different. 4, strong anti collision: known as original data and its MD5 value, want to find someone with the same MD5 value of the data (i.e. data falsification) is very difficult. The role of MD5 is to make the large capacity information in the private key is signed with a digital signature software are compressed into a confidential format (is an arbitrary length byte string transform into a long string of sixteen hexadecimal numbers). In addition to MD5, one of the more famous are SHA-1, RIPEMD and Haval.)
Update : 2025-02-17 Size : 21kb Publisher : Sky_Vico

one way hashing algorithm
Update : 2025-02-17 Size : 311kb Publisher : Shantek
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.