Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - sha-2
Search - sha-2 - List
SHA-2 的代码实现-SHA-2 source implementation
Update : 2025-02-17 Size : 64kb Publisher : 林叶

一个sha 哈希密码支撑算法系列的程序 包括了sha1,sha256,sha384和sha512算法-a password support Hash Algorithm series of procedures including sha1, SHA256, SHA384 and SHA512 Algorithm
Update : 2025-02-17 Size : 25kb Publisher : 拂晓

数字签名加密算法的两座大厦先后倒塌—MD5和SHA-1这两种应用最为广泛的数字签名加密算法都被山东大学的王小云教授破解。-encrypted digital signature algorithm has two buildings collapsed- MD5 and SHA-1 that the two most widely used digital signature encryption algorithm has been the Shandong University Professor Bruce Schneier break.
Update : 2025-02-17 Size : 10kb Publisher : zhou

DL : 0
SHA-1Hash函数源码,可以对任何文件做Hash,得到的Hash值为160位。具有抗强碰撞,弱碰撞等能力。虽然王小云已经找到了个别碰撞。但在新的好的hash函数出来之前仍将被广泛使用。-SHA-1Hash function source, any document can be done right hash, the hash value of 160. Anti-collision, the weak capabilities of the collision. Although Bruce Schneier, had found individual collisions. But the new good hash function will be out before widespread use.
Update : 2025-02-17 Size : 27kb Publisher : 王国维

密码算法中的单向散列函数之SHA算法的C代码-password algorithm for one-way hash algorithm SHA Function of C code
Update : 2025-02-17 Size : 15kb Publisher : WQ

DL : 0
sha-1算法的C实现,只有一个.c程序,可在TC,BC下直接编译运行-sha-1 algorithm to achieve C, only one. C procedures, the TC, BC operation under direct translation
Update : 2025-02-17 Size : 2kb Publisher : xiaoyu

DL : 0
SHA-1 Source Code This optimized SHA-1 implementation conforms to FIPS 180-1
Update : 2025-02-17 Size : 2kb Publisher : linz

文件驱动加密,功能强大,可产生加密分区,支持AES,MD2,MD4,MD5MD2, MD4, MD5, RIPEMD-128, RIPEMD-160, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512. -Document-driven encryption, powerful, can generate encrypted partition, to support AES, MD2, MD4, MD5MD2, MD4, MD5, RIPEMD-128, RIPEMD-160, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512.
Update : 2025-02-17 Size : 3.38mb Publisher : zengzh15

DL : 0
主流hash函数--sha的源代码,可用于数据签名,是目前应用最广的算法之一-Sha mainstream hash function source code, can be used for data signatures, is the application of the algorithm, one of the most widely
Update : 2025-02-17 Size : 3kb Publisher : jiang

汇聚各种应用密码学密码算法技术源码,包括DEC/SHA/RC4/crypt/md5等-Together a wide range of applications of cryptography cipher technology source, including DEC/SHA/RC4/crypt/md5, etc.
Update : 2025-02-17 Size : 5.52mb Publisher : karl

DL : 0
使用标准C++开发的SHA-1算法的实现-Using standard C++ Developed SHA-1 algorithm
Update : 2025-02-17 Size : 3kb Publisher : wilson

DL : 0
支持SHA算法,对文件或者字符串进行散列计算,直接可以应用在程序中,形成文件摘要。-To support the SHA algorithm, on paper or string hash calculation can be applied directly in the proceedings, the formation of a document containing a summary.
Update : 2025-02-17 Size : 8kb Publisher : 孟庆新

DL : 0
SHA-1算法的C语言实现,计算消息的散列值,用于安全通信-SHA-1 algorithm of the C language implementation, computing the hash value information for secure communications
Update : 2025-02-17 Size : 87kb Publisher : zhaolingxi

DL : 0
MAC算法SHA—1算法的C语言实现源码-SHA-1 algorithm for the C language source
Update : 2025-02-17 Size : 2kb Publisher : Sophia quan

DL : 0
一个非常好的SHA-1源代码,在其目录下建立一个a.txt,将明文保存在a.txt中,在执行SHA-1就行-SHA-1
Update : 2025-02-17 Size : 2kb Publisher : xx

sha-512散列函数 sha-512散列函数-THIS SOFTWARE IS PROVIDED BY ALLAN SADDI AND HIS CONTRIBUTORS ``AS IS * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL ALLAN SADDI OR HIS CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE.
Update : 2025-02-17 Size : 4kb Publisher : 王五

DL : 0
C实现的SHA-1,SHA-256,SHA-512算法-。
Update : 2025-02-17 Size : 52kb Publisher : mcszzz

DL : 0
This is SHA-1 allgorithmwhich may be used to generate message digests. This is written in C language and runs in Linux environment.
Update : 2025-02-17 Size : 82kb Publisher : pratheek19

SHA-2 (Secure Hash Algorithm 2) hash function, written in C language.
Update : 2025-02-17 Size : 64kb Publisher : gKir

DL : 0
Test application for SHA
Update : 2025-02-17 Size : 7kb Publisher : Rakesh
« 12 3 4 5 6 7 8 9 10 ... 17 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.