Location:
Search - hash sha-1
Search list
Description: 使用VB写的加密算法库,包括Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms (SHA-1, SHA-256, MD2, MD4, MD5, and RipeMD), 还有 Huffman和Base64算法.- Uses encryption algorithm storehouse which VB writes, including
Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA,
Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128,
Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash
algorithms (SHA-1, SHA-256, MD2, MD4, MD5, and RipeMD), but also has
Huffman and the Base64 algorithm
Platform: |
Size: 635904 |
Author: none |
Hits:
Description: 技术说明,还有RSA算法、HASH算法、MD5、sha1RSA等的C源码.-technical note, RSA algorithm, hash algorithm, MD5, sha1RSA the C source.
Platform: |
Size: 91136 |
Author: 彭明 |
Hits:
Description: HMAC即带密钥的HASH函数,用它产生的报文鉴别码(MAC)可以实现报文鉴别。这里我将其做成一个软件,用于对文件的合法性进行校验。以下我先简单介绍软件相关背景知识再介绍其代码实现。
-HMAC key is to bring the hash function, used the text of the report identifying code (MAC) can realize the text identification. I am here to create a software for the document verifying the legitimacy. I briefly introduce software-related background knowledge will introduce its implementation of the code.
Platform: |
Size: 50176 |
Author: 杨飞 |
Hits:
Description: 计算文件hash值的源代码,包含crc,md2,md4,md5,sha,sha1,sha256,ra-Calculated hash value of document
Platform: |
Size: 281600 |
Author: 风成 |
Hits:
Description: 传统Hash编码算法SHA-1的具体实现,输入一个字符串,输出其SHA-1编码值-Traditional Hash Algorithm SHA-1 encoding specific realize, enter a string, the output of its SHA-1 encoding value
Platform: |
Size: 84992 |
Author: 王东 |
Hits:
Description: 我自己用javascript实现的sha-1散列函数,对要在web客户端要进行单向加密的情况应该很有帮助-I am using javascript to achieve the sha-1 hash function, and in the web client to conduct a one-way encryption of the situation should be very helpful
Platform: |
Size: 2048 |
Author: 罗小江 |
Hits:
Description: 扫描一个C源程序,用Hash表存储该程序中出现的关键字,并统计该程序中的关键字出现频度。用线性探测法解决Hash冲突。设Hash函数为:
Hash(key)=[(key的第一个字母序号)*100+(key的最后一个字母序号)] MOD 41-Scan a C source program, using Hash Table to store the keywords appear in the procedure, and statistical procedures in the frequency of the keyword appears. Linear detection method to resolve the conflict Hash. Based Hash function: Hash (key) = [(key the first letter of the serial number)* 100+ (Key serial number of the last letter)] MOD 41
Platform: |
Size: 9216 |
Author: zhang |
Hits:
Description: SHA-1的算法源码,输入一段用户名,输入该用户名的HASH码-SHA-1 algorithm source, enter a period of user name, enter the user name of the HASH code
Platform: |
Size: 870400 |
Author: eric |
Hits:
Description: 用SHA算法实现对任意文件的hash摘要,并且把hash摘要值(至少为160bit)存入另一个文件,形如:
hash inputfile hashvaluefile
说明:SHA算法的实现至少为160bit,或者可以选择256,384或者512的,可以查阅相关资料,按照标准来实现(hash的算法是否正确,可以和网上的标准算法对比,用相同的输入看是否能够得到相同的输出)控制台编程:
int main(int argc, char *argv[ ])
-Programme for SHA-1, include the project and .cpp&.h files.Absolutely available
Platform: |
Size: 4096 |
Author: Heyyou |
Hits:
Description: sah-1(Secure Hash Algorithm,安全散列算法)算法源程序-the c sourse code for sha-1(Secure Hash Algorithm) Algorithm
Platform: |
Size: 2048 |
Author: hehailian |
Hits:
Description: 求所有主流Hash值的程序,包括MD5,sha等-Hash value for all major procedures, including MD5, sha, etc.
Platform: |
Size: 9042944 |
Author: tz1985 |
Hits:
Description: hash md5 RSA Encryption Decryption
Platform: |
Size: 34816 |
Author: shaheen |
Hits:
Description: 针对文件的Md5值计算 CRC值计算 SHA值计算
的类的使用与DEMO-md5
Platform: |
Size: 384000 |
Author: 陶丹丹 |
Hits:
Description: 应用密码课程设计;VC#2005环境;SHA-256简单功能,显示每次中间哈希结果。-Applied Cryptography course design VC# 2005 environment SHA-256 Simple function, showed intermediate hash result every time.
Platform: |
Size: 331776 |
Author: bolide |
Hits:
Description: SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。-SHA-1
Platform: |
Size: 3481600 |
Author: 张万东 |
Hits:
Description: implementation for Secure Hash Algorithm 1
SHA-1
in vhdl language
contain no test file.
Platform: |
Size: 14336 |
Author: waleed |
Hits:
Description: Report on SHA and hash.
SHA-1 is a cryptographic hash function designed by the United States National and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". -Report on SHA and hash.
SHA-1 is a cryptographic hash function designed by the United States National and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm".
Platform: |
Size: 205824 |
Author: Appu |
Hits:
Description: 哈希函数SHA-1的c实现,能正常运行。很实用,适合用来学习sha-1,希望对你有帮助。-A hash function is SHA-1 (c) achieve normal operation. Very practical, ideal for learning the sha-1, you want to help.
Platform: |
Size: 175104 |
Author: 杨俊明 |
Hits:
Description: SHA-1的算法实现,可对字符串进行hash-SHA-1 algorithm can hash strings
Platform: |
Size: 453632 |
Author: hu |
Hits:
Description: Hash函数是提供数据完整性保障的一个重要工具。本次实验,我们希望通过上机操作,使 同学们对安全Hash算法SHA-1的基本原理有一个全面的理解。通过本次实验,使学生掌握对 Hash函数的应用,为后面数字签名方案的学习打下基础。(The Hash function is an important tool for providing data integrity protection. In this experiment, we hope to have a comprehensive understanding of the basic principles of the security Hash algorithm SHA-1 through the operation of the machine. Through this experiment, the students can grasp the application of the Hash function and lay the foundation for the learning of the later digital signature scheme.)
Platform: |
Size: 6144 |
Author: 斩月
|
Hits: