Location:
Search - Sha-256 java
Search list
Description: Java中常用的加密算法应用,1. MD5加密,常用于加密用户名密码,当用户验证时。2. SHA加密,与MD5相似的用法,只是两者的算法不同。3. RSA加密,RAS加密允许解密。常用于文本内容的加密。-Java encryption algorithm commonly used in applications, 1. MD5 encryption, user name commonly used in the encryption password, when a user authentication. 2. SHA encryption, and MD5 is similar to the usage of only two different algorithm. 3. RSA encryption, RAS encryption allowing decryption. Commonly used in the text of encryption.
Platform: |
Size: 1024 |
Author: wangmin |
Hits:
Description: SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-512 (这些有时候也被称做 SHA-2)。
-SHA (Secure Hash Algorithm, Secure Hash Algorithm translated) is a U.S. National Security Agency (NSA) design, the U.S. National Institute of Standards and Technology (NIST) released a series of password hash function. Formally known as the SHA family members of the first release in 1993. But now people take it the informal name of a SHA-0 in order to avoid confusion of its successor. Two years later, SHA-1, the first successor to SHA issued. There are four variants have been released to enhance the output of some minor changes to the scope and design: SHA-224, SHA-256, SHA-384 and SHA-512 (these are sometimes also known as SHA-2).
Platform: |
Size: 1024 |
Author: 陈诚 |
Hits:
Description: Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
Platform: |
Size: 3072 |
Author: patataman |
Hits:
Description: 包含各種加密演算法和Digital Signatures(MD2 MD4 MD5 RIPEMD-128 RIPEMD-160 SHA-0 SHA-1 SHA-256 SHA-384 SHA-512 Tiger)-THIS SOFTWARE IS PROVIDED BY THE CRYPTIX FOUNDATION LIMITED ``AS IS
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR
OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF
USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED
AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
Platform: |
Size: 936960 |
Author: 陳盈 |
Hits:
Description: SHA—256哈希摘要算法的实现,用JAVA实现-SHA-256 hash digest algorithm implementation, using JAVA implementation
Platform: |
Size: 3072 |
Author: luye |
Hits:
Description: Implemmentation of SHA-256 in Java using java.security.MessageDigest
Platform: |
Size: 1024 |
Author: imenu |
Hits:
Description: 在JAVA环境下sha_256的实现以及设计文档,无制作界面,在dos下运行-In the JAVA environment sha_256 realization and design documents, without making the interface, running in dos
Platform: |
Size: 176128 |
Author: merklc |
Hits:
Description: bouncycastle 一个开源的 java 包,可以提供一些加密算法的实现. 使用这个包进行 DES AES RSA SHA ECG SHA MD5 等加密算法 .算法不像jre里面哪有有限制,是可以使用 256 位密钥 android 里面的加密算法就是使用这个包 ! 适合一些不想依赖于 jre 加密实现的或者没有该环境的软件 .-<bouncycastle> an open source java package can provide encryption algorithm implementation using this package for AES and other encryption algorithms can use the 256 key android inside the encryption algorithm is the use of this package!
Platform: |
Size: 1707008 |
Author: crw |
Hits:
Description: 用java代码来实现SHA-256的加密算法-SHA-256 encryption algorithm java code
Platform: |
Size: 4096 |
Author: panda |
Hits: