Location:
Search - hash sha256
Search list
Description: 包含 sha sha256 sha384 sha512
Platform: |
Size: 26153 |
Author: leo.dean_430 |
Hits:
Description: 一个sha 哈希密码支撑算法系列的程序 包括了sha1,sha256,sha384和sha512算法-a password support Hash Algorithm series of procedures including sha1, SHA256, SHA384 and SHA512 Algorithm
Platform: |
Size: 25600 |
Author: 拂晓 |
Hits:
Description: HMAC即带密钥的HASH函数,用它产生的报文鉴别码(MAC)可以实现报文鉴别。这里我将其做成一个软件,用于对文件的合法性进行校验。以下我先简单介绍软件相关背景知识再介绍其代码实现。
-HMAC key is to bring the hash function, used the text of the report identifying code (MAC) can realize the text identification. I am here to create a software for the document verifying the legitimacy. I briefly introduce software-related background knowledge will introduce its implementation of the code.
Platform: |
Size: 50176 |
Author: 杨飞 |
Hits:
Description: 计算文件hash值的源代码,包含crc,md2,md4,md5,sha,sha1,sha256,ra-Calculated hash value of document
Platform: |
Size: 281600 |
Author: 风成 |
Hits:
Description: javascript实现的SHA-256-384-512 hash算法-javascript realize the SHA-256-384-512 hash algorithm
Platform: |
Size: 9216 |
Author: tony |
Hits:
Description: ASM 多种hash模块,汇编源码
MD2,4,5 SHA 等多种加密算法
还有其他赠送内容-ASM multiple hash module, the compilation of source MD2, 4,5 SHA encryption algorithm, etc. There are other free content
Platform: |
Size: 165888 |
Author: |
Hits:
Description: 安全散列函数的VERILOG实现,通过了fpga验证,在系统正可以直接当IP盒应用-Secure Hash Function VERILOG achieve, through the FPGA verification, the system is can be directly applied when the IP box
Platform: |
Size: 69632 |
Author: 金鑫 |
Hits:
Description: hash算法 This VBScript ASP file tests the accompanying SHA256.asp for generating
digests of strings.-hash algorithm This VBScript ASP file tests the accompanying SHA256.asp for generating
digests of strings.
Platform: |
Size: 8192 |
Author: tll |
Hits:
Description: Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
Platform: |
Size: 3072 |
Author: patataman |
Hits:
Description: 最新Crypto++5.6版 加密解密函数类库。C++版。完美支持Visual Studio 2008,2005,2003,2002,6.0,C++ Builder 2009,GCC等主流编译器。 -Abstract Base Classes
cryptlib.h
Authenticated Encryption
AuthenticatedSymmetricCipherDocumentation
Symmetric Ciphers
SymmetricCipherDocumentation
Hash Functions
SHA1, SHA224, SHA256, SHA384, SHA512, Tiger, Whirlpool, RIPEMD160, RIPEMD320, RIPEMD128, RIPEMD256, Weak1::MD2, Weak1::MD4, Weak1::MD5
Non-Cryptographic Checksums
CRC32, Adler32
Message Authentication Codes
VMAC, HMAC, CBC_MAC, CMAC, DMAC, TTMAC, GCM (GMAC)
Random Number Generators
NullRNG(), LC_RNG, RandomPool, BlockingRng, NonblockingRng, AutoSeededRandomPool, AutoSeededX917RNG, DefaultAutoSeededRNG
Password-based Cryptography
PasswordBasedKeyDerivationFunction
Public Key Cryptosystems
DLIES, ECIES, LUCES, RSAES, RabinES, LUC_IES
Public Key Signature Schemes
DSA, GDSA, ECDSA, NR, ECNR, LUCSS, RSASS, RSASS_ISO, RabinSS, RWSS, ESIGN
Key Agreement
DH, DH2, MQV, ECDH, ECMQV, XTR_DH
Algebraic Structures
Integer, PolynomialMod2, PolynomialOver, RingOfPolynomialsOver, ModularArithmetic, MontgomeryRepresentati
Platform: |
Size: 1048576 |
Author: 沧海 |
Hits:
Description: SHA-256源代码,三个对外的函数:void SHA256Init (SHA256Context *sc)
void SHA256Update (SHA256Context *sc, const void *data, uint32_t len)
void SHA256Final (SHA256Context *sc, uint8_t hash[SHA256_HASH_SIZE])
第一个函数初始化,第二个函数输入要hash的字符串,第三个函数输出结果-SHA-256 source code, three external function: void SHA256Init (SHA256Context* sc) void SHA256Update (SHA256Context* sc, const void* data, uint32_t len) void SHA256Final (SHA256Context* sc, uint8_t hash [SHA256_HASH_SIZE]) The first function is initialized, the second hash function, enter the string, the third function of output
Platform: |
Size: 5120 |
Author: zoulijun |
Hits:
Description: Source code from SHA256 hash.
Platform: |
Size: 9216 |
Author: Daldegam |
Hits:
Description: secure hash 标准文档,包括sha1,sha256,sha512-secure hash standard, sha1,sha256,sha512
Platform: |
Size: 179200 |
Author: mickey |
Hits:
Description: In cryptography, SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. SHA-2 includes a significant number of changes from its predecessor, SHA-1. SHA-2 consists of a set of four hash functions with digests that are 224, 256, 384 or 512 bits.
Platform: |
Size: 4096 |
Author: monica1987is |
Hits:
Description: 杂凑算法SHA256的C++源码,用于制作算法动态库,提供了动态库接口-SHA256 hash algorithm of the C++ source code for the production of algorithms dynamic libraries, provides a dynamic library interface
Platform: |
Size: 553984 |
Author: 曹伟琼 |
Hits:
Description: SHA-256 hash implementation and interface functions.
Platform: |
Size: 4096 |
Author: singeiba |
Hits:
Description: SHA-256加密算法,可计算出字符串或文件的HASH值,带测试程序。-SHA-256 encryption algorithm to calculate the value HASH string or file with the test procedures.
Platform: |
Size: 3072 |
Author: 刘颖兴 |
Hits:
Description: SHA 252
SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the computed hash (the execution of the algorithm) to a known and expected hash value, a person can determine the data s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their one-way nature: given only a computed hash value, it is generally impossible to derive the original data.
SHA-2 includes significant changes its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.-SHA 252
SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the computed hash (the execution of the algorithm) to a known and expected hash value, a person can determine the data s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their one-way nature: given only a computed hash value, it is generally impossible to derive the original data.
SHA-2 includes significant changes its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.
Platform: |
Size: 2048 |
Author: siva prasad |
Hits:
Description: SHA-256 hash implementation and interface.
Platform: |
Size: 1024 |
Author: gefiefd |
Hits:
Description: SHA算法源码,包括sha1和sha256的源码。(SHA algorithm source code)
Platform: |
Size: 4096 |
Author: wison
|
Hits: