Welcome![Sign In][Sign Up]
Location:
Search - SHA-2

Search list

[Crack Hacksha2-1.0

Description: SHA-2 的代码实现-SHA-2 source implementation
Platform: | Size: 65536 | Author: 林叶 | Hits:

[Crack Hacksha(1,256,384,512)

Description: 一个sha 哈希密码支撑算法系列的程序 包括了sha1,sha256,sha384和sha512算法-a password support Hash Algorithm series of procedures including sha1, SHA256, SHA384 and SHA512 Algorithm
Platform: | Size: 25600 | Author: 拂晓 | Hits:

[Crack HackSHA算法代码

Description: 数字签名加密算法的两座大厦先后倒塌—MD5和SHA-1这两种应用最为广泛的数字签名加密算法都被山东大学的王小云教授破解。-encrypted digital signature algorithm has two buildings collapsed- MD5 and SHA-1 that the two most widely used digital signature encryption algorithm has been the Shandong University Professor Bruce Schneier break.
Platform: | Size: 10240 | Author: zhou | Hits:

[Crack Hacksha-1

Description: SHA-1Hash函数源码,可以对任何文件做Hash,得到的Hash值为160位。具有抗强碰撞,弱碰撞等能力。虽然王小云已经找到了个别碰撞。但在新的好的hash函数出来之前仍将被广泛使用。-SHA-1Hash function source, any document can be done right hash, the hash value of 160. Anti-collision, the weak capabilities of the collision. Although Bruce Schneier, had found individual collisions. But the new good hash function will be out before widespread use.
Platform: | Size: 27648 | Author: 王国维 | Hits:

[Crack HackHash-SHA

Description: 密码算法中的单向散列函数之SHA算法的C代码-password algorithm for one-way hash algorithm SHA Function of C code
Platform: | Size: 15360 | Author: WQ | Hits:

[SCMmysha1

Description: sha-1算法的C实现,只有一个.c程序,可在TC,BC下直接编译运行-sha-1 algorithm to achieve C, only one. C procedures, the TC, BC operation under direct translation
Platform: | Size: 2048 | Author: xiaoyu | Hits:

[Crack HackSHA-1

Description: SHA-1 Source Code This optimized SHA-1 implementation conforms to FIPS 180-1
Platform: | Size: 2048 | Author: linz | Hits:

[Crack HackFreeOTFE_2_00_src

Description: 文件驱动加密,功能强大,可产生加密分区,支持AES,MD2,MD4,MD5MD2, MD4, MD5, RIPEMD-128, RIPEMD-160, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512. -Document-driven encryption, powerful, can generate encrypted partition, to support AES, MD2, MD4, MD5MD2, MD4, MD5, RIPEMD-128, RIPEMD-160, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512.
Platform: | Size: 3543040 | Author: zengzh15 | Hits:

[Crack Hacksha

Description: 主流hash函数--sha的源代码,可用于数据签名,是目前应用最广的算法之一-Sha mainstream hash function source code, can be used for data signatures, is the application of the algorithm, one of the most widely
Platform: | Size: 3072 | Author: jiang | Hits:

[Compress-Decompress algrithmsmd5-sha-dec-crypt

Description: 汇聚各种应用密码学密码算法技术源码,包括DEC/SHA/RC4/crypt/md5等-Together a wide range of applications of cryptography cipher technology source, including DEC/SHA/RC4/crypt/md5, etc.
Platform: | Size: 5791744 | Author: karl | Hits:

[Crack Hacksha

Description: 使用标准C++开发的SHA-1算法的实现-Using standard C++ Developed SHA-1 algorithm
Platform: | Size: 3072 | Author: wilson | Hits:

[Crack Hacksha

Description: 支持SHA算法,对文件或者字符串进行散列计算,直接可以应用在程序中,形成文件摘要。-To support the SHA algorithm, on paper or string hash calculation can be applied directly in the proceedings, the formation of a document containing a summary.
Platform: | Size: 8192 | Author: 孟庆新 | Hits:

[Crack HackSHA-1

Description: SHA-1算法的C语言实现,计算消息的散列值,用于安全通信-SHA-1 algorithm of the C language implementation, computing the hash value information for secure communications
Platform: | Size: 89088 | Author: zhaolingxi | Hits:

[Crack HackSHA-1

Description: MAC算法SHA—1算法的C语言实现源码-SHA-1 algorithm for the C language source
Platform: | Size: 2048 | Author: Sophia quan | Hits:

[Crack Hacksha-1

Description: 一个非常好的SHA-1源代码,在其目录下建立一个a.txt,将明文保存在a.txt中,在执行SHA-1就行-SHA-1
Platform: | Size: 2048 | Author: xx | Hits:

[File Formatsha512

Description: sha-512散列函数 sha-512散列函数-THIS SOFTWARE IS PROVIDED BY ALLAN SADDI AND HIS CONTRIBUTORS ``AS IS * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL ALLAN SADDI OR HIS CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE.
Platform: | Size: 4096 | Author: 王五 | Hits:

[Data structssha

Description: C实现的SHA-1,SHA-256,SHA-512算法-。
Platform: | Size: 53248 | Author: mcszzz | Hits:

[Linux-UnixSha

Description: This is SHA-1 allgorithmwhich may be used to generate message digests. This is written in C language and runs in Linux environment.
Platform: | Size: 83968 | Author: pratheek19 | Hits:

[Crack Hacksha2-1.0

Description: SHA-2 (Secure Hash Algorithm 2) hash function, written in C language.
Platform: | Size: 65536 | Author: gKir | Hits:

[Crack Hacksha1-c

Description: Test application for SHA
Platform: | Size: 7168 | Author: Rakesh | Hits:
« 12 3 4 5 6 7 8 9 10 ... 17 »

CodeBus www.codebus.net