Location:
Search - hash MD4
Search list
Description: 使用VB写的加密算法库,包括Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms (SHA-1, SHA-256, MD2, MD4, MD5, and RipeMD), 还有 Huffman和Base64算法.
Platform: |
Size: 636247 |
Author: |
Hits:
Description: 使用VB写的加密算法库,包括Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms (SHA-1, SHA-256, MD2, MD4, MD5, and RipeMD), 还有 Huffman和Base64算法.- Uses encryption algorithm storehouse which VB writes, including
Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA,
Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128,
Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash
algorithms (SHA-1, SHA-256, MD2, MD4, MD5, and RipeMD), but also has
Huffman and the Base64 algorithm
Platform: |
Size: 635904 |
Author: none |
Hits:
Description: 用c语言实现得用于测试/md4md5散列算法的可碰撞性算法,用于证明md4/md5的可碰撞性-using language may be used to test/md4md5 hash algorithm collision algorithm can be used to prove md4/md5 nature of the collision
Platform: |
Size: 9216 |
Author: 宋敏 |
Hits:
Description: 最新版本的加密解密算法库,其中包括最流行的hash函数md5,md4,sha-1等-latest version of the encryption and decryption algorithms library, including the most popular hash function md5, md4, sha-1, etc.
Platform: |
Size: 958464 |
Author: 岳云召 |
Hits:
Description: 计算文件hash值的源代码,包含crc,md2,md4,md5,sha,sha1,sha256,ra-Calculated hash value of document
Platform: |
Size: 281600 |
Author: 风成 |
Hits:
Description: SHA-1(Secure Hash Algorithm)是美国国家标准局(National Institute of Standard and Technology NIST)为了配合数位签章演算法(Digital Signature Algorithm DSA)的使用所发布的联邦资讯处理标准-FIPS PUB 180-1(Federal Information Processing Standard Publication 180-1),而SHA-1 则是SHA-1 (FIPS180)的改良版,现今与MD5 皆广被使用拿来做密码验证功能.其设计的方法是根据MD4,来对输入的资料讯息(Message)产生出一个160 位元的讯息摘要(Digest) ,对於资料安全性提供了有效的保障.-SHA-1 (Secure Hash Algorithm) is a United States National Bureau of Standards (National Institute of Standard and Technology NIST) in order to tie in with the digital signature algorithm (Digital Signature Algorithm DSA) issued by the use of Federal Information Processing Standard-FIPS PUB 180-1 (Federal Information Processing Standard Publication 180-1), and SHA-1 is SHA-1 (FIPS180) improved version of the current and MD5 are widely used to make the use of password authentication function. its design method is based on MD4, to the input data message (Message) produced a 160-bit message digest (Digest), for data security to provide effective protection.
Platform: |
Size: 1024 |
Author: zyt |
Hits:
Description: Delphi Cryptographic API Hash example using MD2 MD4 MD5 SHA1 GOST-Delphi Cryptographic API Hash example using MD2 MD4 MD5 SHA1 GOST
Platform: |
Size: 43008 |
Author: LamiaD69 |
Hits:
Description: 计算机芯片不同其大小印第安序不同,一般分为大印第安序和小印第安序,如果不能自动区别,用于签名验证的hash函数结果不一样,不能验证-Indian computer chip the size of the different sequence of different, generally divided into large and small Indian Indian sequence order, if the distinction does not automatically used for signature verification of the hash function is not the same as the results can not be verified
Platform: |
Size: 2048 |
Author: yhl |
Hits:
Description: 最新Crypto++5.6版 加密解密函数类库。C++版。完美支持Visual Studio 2008,2005,2003,2002,6.0,C++ Builder 2009,GCC等主流编译器。 -Abstract Base Classes
cryptlib.h
Authenticated Encryption
AuthenticatedSymmetricCipherDocumentation
Symmetric Ciphers
SymmetricCipherDocumentation
Hash Functions
SHA1, SHA224, SHA256, SHA384, SHA512, Tiger, Whirlpool, RIPEMD160, RIPEMD320, RIPEMD128, RIPEMD256, Weak1::MD2, Weak1::MD4, Weak1::MD5
Non-Cryptographic Checksums
CRC32, Adler32
Message Authentication Codes
VMAC, HMAC, CBC_MAC, CMAC, DMAC, TTMAC, GCM (GMAC)
Random Number Generators
NullRNG(), LC_RNG, RandomPool, BlockingRng, NonblockingRng, AutoSeededRandomPool, AutoSeededX917RNG, DefaultAutoSeededRNG
Password-based Cryptography
PasswordBasedKeyDerivationFunction
Public Key Cryptosystems
DLIES, ECIES, LUCES, RSAES, RabinES, LUC_IES
Public Key Signature Schemes
DSA, GDSA, ECDSA, NR, ECNR, LUCSS, RSASS, RSASS_ISO, RabinSS, RWSS, ESIGN
Key Agreement
DH, DH2, MQV, ECDH, ECMQV, XTR_DH
Algebraic Structures
Integer, PolynomialMod2, PolynomialOver, RingOfPolynomialsOver, ModularArithmetic, MontgomeryRepresentati
Platform: |
Size: 1048576 |
Author: 沧海 |
Hits:
Description: Crypto++的文档,虽然不是很全,但是其中有简单的调用该类库的方法实例。-Abstract Base Classes
cryptlib.h
Authenticated Encryption
AuthenticatedSymmetricCipherDocumentation
Symmetric Ciphers
SymmetricCipherDocumentation
Hash Functions
SHA1, SHA224, SHA256, SHA384, SHA512, Tiger, Whirlpool, RIPEMD160, RIPEMD320, RIPEMD128, RIPEMD256, Weak1::MD2, Weak1::MD4, Weak1::MD5
Non-Cryptographic Checksums
CRC32, Adler32
Message Authentication Codes
VMAC, HMAC, CBC_MAC, CMAC, DMAC, TTMAC, GCM (GMAC)
Random Number Generators
NullRNG(), LC_RNG, RandomPool, BlockingRng, NonblockingRng, AutoSeededRandomPool, AutoSeededX917RNG, DefaultAutoSeededRNG
Password-based Cryptography
PasswordBasedKeyDerivationFunction
Public Key Cryptosystems
DLIES, ECIES, LUCES, RSAES, RabinES, LUC_IES
Public Key Signature Schemes
DSA, GDSA, ECDSA, NR, ECNR, LUCSS, RSASS, RSASS_ISO, RabinSS, RWSS, ESIGN
Key Agreement
DH, DH2, MQV, ECDH, ECMQV, XTR_DH
Algebraic Structures
Integer, PolynomialMod2, PolynomialOver, RingOfPolynomialsOver, ModularArithmetic, MontgomeryRepresentati
Platform: |
Size: 79872 |
Author: 沧海 |
Hits:
Description: MD5即Message-Digest Algorithm 5(信息-摘要算法 5),用于确保信息传输完整一致。是计算机广泛使用的杂凑算法之一(又译摘要算法、哈希算法),主流编程语言普遍已有MD5实现。
将数据(如汉字)运算为另一固定长度值是杂凑算法的基础原理,MD5的前身有MD2、MD3和MD4。-MD5 or Message-Digest Algorithm 5 (Information- Digest Algorithm 5), used to ensure a complete and consistent information transfer. Widely used computer, one of hash algorithms (also translated digest algorithm, hash algorithm), mainstream programming languages have generally MD5 implementation. The data (such as Chinese characters) operator to another fixed-length hash value is the basis of principle of the algorithm, MD5' s predecessor are MD2, MD3, and MD4.
Platform: |
Size: 2048 |
Author: jolly |
Hits:
Description: Creating hash of md5, md4, md2 and other hashes!
Platform: |
Size: 120832 |
Author: AleX |
Hits:
Description: Hash MD4 C++ Emlementation
Platform: |
Size: 11419648 |
Author: Marina |
Hits:
Description: 包含常见的的hash算法,MD4,MD5,SHA-160,SHA-256,crc等,对字符串或者文件进行处理,生成相应的hash值-Contains common hash algorithm, MD4, MD5, SHA-160, SHA-256, crc, etc., on the string or file handle, generate the corresponding hash value
Platform: |
Size: 281600 |
Author: 丹丹 |
Hits:
Description: 很给力的MD4算法,对文件进行Hash操作,非常实用的东西哦,亲-MD4 c++
Platform: |
Size: 2048 |
Author: 陆羽 |
Hits:
Description: php中几种哈希函数的对比,包含MD4、MD5、SHA-1、SHA-256、SHA-384以及SHA-512-php several hash functions in contrast, contains of MD4, MD5, SHA-1, SHA-256, SHA-384 and SHA-512
Platform: |
Size: 15360 |
Author: 张奇 |
Hits:
Description: The implementation of the hash functions MD4.
Platform: |
Size: 2048 |
Author: Oleg |
Hits:
Description: MD4 hash implementation.
Platform: |
Size: 4096 |
Author: rerziuqan |
Hits:
Description: MD4 算法标准源码 md4 hash算法-md4 Hash
Platform: |
Size: 2048 |
Author: 金天烨 |
Hits:
Description: MD4杂凑算法的C程序,经测试可用,且可进行debug,用来验证其他加密工具的正确性。(MD4 hash algorithm C program, the test is available, and can be used to verify the correctness of debug and other encryption tool.)
Platform: |
Size: 4096 |
Author: 飞天独爱
|
Hits: