Welcome![Sign In][Sign Up]
Location:
Search - hash MD4

Search list

[Crack HackVBCrypto2.zip

Description: 使用VB写的加密算法库,包括Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms (SHA-1, SHA-256, MD2, MD4, MD5, and RipeMD), 还有 Huffman和Base64算法.
Platform: | Size: 636247 | Author: | Hits:

[Crack HackVBCrypto2

Description: 使用VB写的加密算法库,包括Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms (SHA-1, SHA-256, MD2, MD4, MD5, and RipeMD), 还有 Huffman和Base64算法.- Uses encryption algorithm storehouse which VB writes, including Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms (SHA-1, SHA-256, MD2, MD4, MD5, and RipeMD), but also has Huffman and the Base64 algorithm
Platform: | Size: 635904 | Author: none | Hits:

[Crack Hackmd5coll

Description: 用c语言实现得用于测试/md4md5散列算法的可碰撞性算法,用于证明md4/md5的可碰撞性-using language may be used to test/md4md5 hash algorithm collision algorithm can be used to prove md4/md5 nature of the collision
Platform: | Size: 9216 | Author: 宋敏 | Hits:

[Crack Hackmimaku

Description: 最新版本的加密解密算法库,其中包括最流行的hash函数md5,md4,sha-1等-latest version of the encryption and decryption algorithms library, including the most popular hash function md5, md4, sha-1, etc.
Platform: | Size: 958464 | Author: 岳云召 | Hits:

[Crack Hackrehash_src

Description: 计算文件hash值的源代码,包含crc,md2,md4,md5,sha,sha1,sha256,ra-Calculated hash value of document
Platform: | Size: 281600 | Author: 风成 | Hits:

[Crack Hacktest

Description: SHA-1(Secure Hash Algorithm)是美国国家标准局(National Institute of Standard and Technology NIST)为了配合数位签章演算法(Digital Signature Algorithm DSA)的使用所发布的联邦资讯处理标准-FIPS PUB 180-1(Federal Information Processing Standard Publication 180-1),而SHA-1 则是SHA-1 (FIPS180)的改良版,现今与MD5 皆广被使用拿来做密码验证功能.其设计的方法是根据MD4,来对输入的资料讯息(Message)产生出一个160 位元的讯息摘要(Digest) ,对於资料安全性提供了有效的保障.-SHA-1 (Secure Hash Algorithm) is a United States National Bureau of Standards (National Institute of Standard and Technology NIST) in order to tie in with the digital signature algorithm (Digital Signature Algorithm DSA) issued by the use of Federal Information Processing Standard-FIPS PUB 180-1 (Federal Information Processing Standard Publication 180-1), and SHA-1 is SHA-1 (FIPS180) improved version of the current and MD5 are widely used to make the use of password authentication function. its design method is based on MD4, to the input data message (Message) produced a 160-bit message digest (Digest), for data security to provide effective protection.
Platform: | Size: 1024 | Author: zyt | Hits:

[Crack Hackcrypto_api_hashes

Description: Delphi Cryptographic API Hash example using MD2 MD4 MD5 SHA1 GOST-Delphi Cryptographic API Hash example using MD2 MD4 MD5 SHA1 GOST
Platform: | Size: 43008 | Author: LamiaD69 | Hits:

[CA authadaptendian-md4

Description: 计算机芯片不同其大小印第安序不同,一般分为大印第安序和小印第安序,如果不能自动区别,用于签名验证的hash函数结果不一样,不能验证-Indian computer chip the size of the different sequence of different, generally divided into large and small Indian Indian sequence order, if the distinction does not automatically used for signature verification of the hash function is not the same as the results can not be verified
Platform: | Size: 2048 | Author: yhl | Hits:

[Crack Hackcryptopp560

Description: 最新Crypto++5.6版 加密解密函数类库。C++版。完美支持Visual Studio 2008,2005,2003,2002,6.0,C++ Builder 2009,GCC等主流编译器。 -Abstract Base Classes cryptlib.h Authenticated Encryption AuthenticatedSymmetricCipherDocumentation Symmetric Ciphers SymmetricCipherDocumentation Hash Functions SHA1, SHA224, SHA256, SHA384, SHA512, Tiger, Whirlpool, RIPEMD160, RIPEMD320, RIPEMD128, RIPEMD256, Weak1::MD2, Weak1::MD4, Weak1::MD5 Non-Cryptographic Checksums CRC32, Adler32 Message Authentication Codes VMAC, HMAC, CBC_MAC, CMAC, DMAC, TTMAC, GCM (GMAC) Random Number Generators NullRNG(), LC_RNG, RandomPool, BlockingRng, NonblockingRng, AutoSeededRandomPool, AutoSeededX917RNG, DefaultAutoSeededRNG Password-based Cryptography PasswordBasedKeyDerivationFunction Public Key Cryptosystems DLIES, ECIES, LUCES, RSAES, RabinES, LUC_IES Public Key Signature Schemes DSA, GDSA, ECDSA, NR, ECNR, LUCSS, RSASS, RSASS_ISO, RabinSS, RWSS, ESIGN Key Agreement DH, DH2, MQV, ECDH, ECMQV, XTR_DH Algebraic Structures Integer, PolynomialMod2, PolynomialOver, RingOfPolynomialsOver, ModularArithmetic, MontgomeryRepresentati
Platform: | Size: 1048576 | Author: 沧海 | Hits:

[Windows DevelopCryptoPPGuide

Description: Crypto++的文档,虽然不是很全,但是其中有简单的调用该类库的方法实例。-Abstract Base Classes cryptlib.h Authenticated Encryption AuthenticatedSymmetricCipherDocumentation Symmetric Ciphers SymmetricCipherDocumentation Hash Functions SHA1, SHA224, SHA256, SHA384, SHA512, Tiger, Whirlpool, RIPEMD160, RIPEMD320, RIPEMD128, RIPEMD256, Weak1::MD2, Weak1::MD4, Weak1::MD5 Non-Cryptographic Checksums CRC32, Adler32 Message Authentication Codes VMAC, HMAC, CBC_MAC, CMAC, DMAC, TTMAC, GCM (GMAC) Random Number Generators NullRNG(), LC_RNG, RandomPool, BlockingRng, NonblockingRng, AutoSeededRandomPool, AutoSeededX917RNG, DefaultAutoSeededRNG Password-based Cryptography PasswordBasedKeyDerivationFunction Public Key Cryptosystems DLIES, ECIES, LUCES, RSAES, RabinES, LUC_IES Public Key Signature Schemes DSA, GDSA, ECDSA, NR, ECNR, LUCSS, RSASS, RSASS_ISO, RabinSS, RWSS, ESIGN Key Agreement DH, DH2, MQV, ECDH, ECMQV, XTR_DH Algebraic Structures Integer, PolynomialMod2, PolynomialOver, RingOfPolynomialsOver, ModularArithmetic, MontgomeryRepresentati
Platform: | Size: 79872 | Author: 沧海 | Hits:

[Crack HackMD5

Description: MD5即Message-Digest Algorithm 5(信息-摘要算法 5),用于确保信息传输完整一致。是计算机广泛使用的杂凑算法之一(又译摘要算法、哈希算法),主流编程语言普遍已有MD5实现。   将数据(如汉字)运算为另一固定长度值是杂凑算法的基础原理,MD5的前身有MD2、MD3和MD4。-MD5 or Message-Digest Algorithm 5 (Information- Digest Algorithm 5), used to ensure a complete and consistent information transfer. Widely used computer, one of hash algorithms (also translated digest algorithm, hash algorithm), mainstream programming languages have generally MD5 implementation. The data (such as Chinese characters) operator to another fixed-length hash value is the basis of principle of the algorithm, MD5' s predecessor are MD2, MD3, and MD4.
Platform: | Size: 2048 | Author: jolly | Hits:

[Windows DevelopHash

Description: Creating hash of md5, md4, md2 and other hashes!
Platform: | Size: 120832 | Author: AleX | Hits:

[Software EngineeringL3_Hash

Description: Hash MD4 C++ Emlementation
Platform: | Size: 11419648 | Author: Marina | Hits:

[Crack Hackhash

Description: 包含常见的的hash算法,MD4,MD5,SHA-160,SHA-256,crc等,对字符串或者文件进行处理,生成相应的hash值-Contains common hash algorithm, MD4, MD5, SHA-160, SHA-256, crc, etc., on the string or file handle, generate the corresponding hash value
Platform: | Size: 281600 | Author: 丹丹 | Hits:

[Crack Hackmd4

Description: 很给力的MD4算法,对文件进行Hash操作,非常实用的东西哦,亲-MD4 c++
Platform: | Size: 2048 | Author: 陆羽 | Hits:

[WEB Codeseveral-hash-functions-in-php

Description: php中几种哈希函数的对比,包含MD4、MD5、SHA-1、SHA-256、SHA-384以及SHA-512-php several hash functions in contrast, contains of MD4, MD5, SHA-1, SHA-256, SHA-384 and SHA-512
Platform: | Size: 15360 | Author: 张奇 | Hits:

[JSP/JavaMD4

Description: The implementation of the hash functions MD4.
Platform: | Size: 2048 | Author: Oleg | Hits:

[Linux-Unixmd4

Description: MD4 hash implementation.
Platform: | Size: 4096 | Author: rerziuqan | Hits:

[Crack Hackmd4

Description: MD4 算法标准源码 md4 hash算法-md4 Hash
Platform: | Size: 2048 | Author: 金天烨 | Hits:

[Crack HackMD4

Description: MD4杂凑算法的C程序,经测试可用,且可进行debug,用来验证其他加密工具的正确性。(MD4 hash algorithm C program, the test is available, and can be used to verify the correctness of debug and other encryption tool.)
Platform: | Size: 4096 | Author: 飞天独爱 | Hits:
« 12 »

CodeBus www.codebus.net