Welcome![Sign In][Sign Up]
Location:
Search - hash sha256

Search list

[Crypt_Decrypt algrithmshash全代码

Description: 包含 sha sha256 sha384 sha512
Platform: | Size: 26153 | Author: leo.dean_430 | Hits:

[Crack Hacksha(1,256,384,512)

Description: 一个sha 哈希密码支撑算法系列的程序 包括了sha1,sha256,sha384和sha512算法-a password support Hash Algorithm series of procedures including sha1, SHA256, SHA384 and SHA512 Algorithm
Platform: | Size: 25600 | Author: 拂晓 | Hits:

[Crack Hack基于SHA-256的HMAC文件校验器

Description: HMAC即带密钥的HASH函数,用它产生的报文鉴别码(MAC)可以实现报文鉴别。这里我将其做成一个软件,用于对文件的合法性进行校验。以下我先简单介绍软件相关背景知识再介绍其代码实现。 -HMAC key is to bring the hash function, used the text of the report identifying code (MAC) can realize the text identification. I am here to create a software for the document verifying the legitimacy. I briefly introduce software-related background knowledge will introduce its implementation of the code.
Platform: | Size: 50176 | Author: 杨飞 | Hits:

[Crack Hackrehash_src

Description: 计算文件hash值的源代码,包含crc,md2,md4,md5,sha,sha1,sha256,ra-Calculated hash value of document
Platform: | Size: 281600 | Author: 风成 | Hits:

[Crack Hackjssha2-0.3

Description: javascript实现的SHA-256-384-512 hash算法-javascript realize the SHA-256-384-512 hash algorithm
Platform: | Size: 9216 | Author: tony | Hits:

[Crack HackCrypto

Description: ASM 多种hash模块,汇编源码 MD2,4,5 SHA 等多种加密算法 还有其他赠送内容-ASM multiple hash module, the compilation of source MD2, 4,5 SHA encryption algorithm, etc. There are other free content
Platform: | Size: 165888 | Author: | Hits:

[Crack Hacksha_core

Description: 安全散列函数的VERILOG实现,通过了fpga验证,在系统正可以直接当IP盒应用-Secure Hash Function VERILOG achieve, through the FPGA verification, the system is can be directly applied when the IP box
Platform: | Size: 69632 | Author: 金鑫 | Hits:

[WEB CodeSHA

Description: hash算法 This VBScript ASP file tests the accompanying SHA256.asp for generating digests of strings.-hash algorithm This VBScript ASP file tests the accompanying SHA256.asp for generating digests of strings.
Platform: | Size: 8192 | Author: tll | Hits:

[JSP/Javasha256.java

Description: Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
Platform: | Size: 3072 | Author: patataman | Hits:

[Crack Hackcryptopp560

Description: 最新Crypto++5.6版 加密解密函数类库。C++版。完美支持Visual Studio 2008,2005,2003,2002,6.0,C++ Builder 2009,GCC等主流编译器。 -Abstract Base Classes cryptlib.h Authenticated Encryption AuthenticatedSymmetricCipherDocumentation Symmetric Ciphers SymmetricCipherDocumentation Hash Functions SHA1, SHA224, SHA256, SHA384, SHA512, Tiger, Whirlpool, RIPEMD160, RIPEMD320, RIPEMD128, RIPEMD256, Weak1::MD2, Weak1::MD4, Weak1::MD5 Non-Cryptographic Checksums CRC32, Adler32 Message Authentication Codes VMAC, HMAC, CBC_MAC, CMAC, DMAC, TTMAC, GCM (GMAC) Random Number Generators NullRNG(), LC_RNG, RandomPool, BlockingRng, NonblockingRng, AutoSeededRandomPool, AutoSeededX917RNG, DefaultAutoSeededRNG Password-based Cryptography PasswordBasedKeyDerivationFunction Public Key Cryptosystems DLIES, ECIES, LUCES, RSAES, RabinES, LUC_IES Public Key Signature Schemes DSA, GDSA, ECDSA, NR, ECNR, LUCSS, RSASS, RSASS_ISO, RabinSS, RWSS, ESIGN Key Agreement DH, DH2, MQV, ECDH, ECMQV, XTR_DH Algebraic Structures Integer, PolynomialMod2, PolynomialOver, RingOfPolynomialsOver, ModularArithmetic, MontgomeryRepresentati
Platform: | Size: 1048576 | Author: 沧海 | Hits:

[Crack Hacksha256

Description: SHA-256源代码,三个对外的函数:void SHA256Init (SHA256Context *sc) void SHA256Update (SHA256Context *sc, const void *data, uint32_t len) void SHA256Final (SHA256Context *sc, uint8_t hash[SHA256_HASH_SIZE]) 第一个函数初始化,第二个函数输入要hash的字符串,第三个函数输出结果-SHA-256 source code, three external function: void SHA256Init (SHA256Context* sc) void SHA256Update (SHA256Context* sc, const void* data, uint32_t len) void SHA256Final (SHA256Context* sc, uint8_t hash [SHA256_HASH_SIZE]) The first function is initialized, the second hash function, enter the string, the third function of output
Platform: | Size: 5120 | Author: zoulijun | Hits:

[Compress-Decompress algrithmsSHA256

Description: Source code from SHA256 hash.
Platform: | Size: 9216 | Author: Daldegam | Hits:

[Documentsfips180-2

Description: secure hash 标准文档,包括sha1,sha256,sha512-secure hash standard, sha1,sha256,sha512
Platform: | Size: 179200 | Author: mickey | Hits:

[CA authSHA256

Description: In cryptography, SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. SHA-2 includes a significant number of changes from its predecessor, SHA-1. SHA-2 consists of a set of four hash functions with digests that are 224, 256, 384 or 512 bits.
Platform: | Size: 4096 | Author: monica1987is | Hits:

[Windows Developsha256

Description: 杂凑算法SHA256的C++源码,用于制作算法动态库,提供了动态库接口-SHA256 hash algorithm of the C++ source code for the production of algorithms dynamic libraries, provides a dynamic library interface
Platform: | Size: 553984 | Author: 曹伟琼 | Hits:

[Linux-Unixsha256

Description: SHA-256 hash implementation and interface functions.
Platform: | Size: 4096 | Author: singeiba | Hits:

[ARM-PowerPC-ColdFire-MIPSSHA256

Description: SHA-256加密算法,可计算出字符串或文件的HASH值,带测试程序。-SHA-256 encryption algorithm to calculate the value HASH string or file with the test procedures.
Platform: | Size: 3072 | Author: 刘颖兴 | Hits:

[JSP/Javasha256

Description: SHA 252 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the computed hash (the execution of the algorithm) to a known and expected hash value, a person can determine the data s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their one-way nature: given only a computed hash value, it is generally impossible to derive the original data. SHA-2 includes significant changes its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.-SHA 252 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the computed hash (the execution of the algorithm) to a known and expected hash value, a person can determine the data s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their one-way nature: given only a computed hash value, it is generally impossible to derive the original data. SHA-2 includes significant changes its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.
Platform: | Size: 2048 | Author: siva prasad | Hits:

[Linux-Unixsha256

Description: SHA-256 hash implementation and interface.
Platform: | Size: 1024 | Author: gefiefd | Hits:

[Crack HackSHA

Description: SHA算法源码,包括sha1和sha256的源码。(SHA algorithm source code)
Platform: | Size: 4096 | Author: wison | Hits:
« 12 »

CodeBus www.codebus.net