Welcome![Sign In][Sign Up]
Location:
Search - SHA

Search list

[Crack Hacksha源码.rar

Description: sha源代码
Platform: | Size: 105572 | Author: | Hits:

[Crack Hacksha-1

Description: SHA-1Hash函数源码,可以对任何文件做Hash,得到的Hash值为160位。具有抗强碰撞,弱碰撞等能力。虽然王小云已经找到了个别碰撞。但在新的好的hash函数出来之前仍将被广泛使用。-SHA-1Hash function source, any document can be done right hash, the hash value of 160. Anti-collision, the weak capabilities of the collision. Although Bruce Schneier, had found individual collisions. But the new good hash function will be out before widespread use.
Platform: | Size: 28059 | Author: 王国维 | Hits:

[Crack HackSHA-1-C

Description: C语言实现的SHA-1报文摘要算法,对学习者来说是一个不错的例子-C language of the SHA-1 digest algorithm, the learners is a good example
Platform: | Size: 10219 | Author: 张三 | Hits:

[Crack HackHash-SHA

Description: 密码算法中的单向散列函数之SHA算法的C代码-password algorithm for one-way hash algorithm SHA Function of C code
Platform: | Size: 15866 | Author: WQ | Hits:

[Crack Hacksha(1,256,384,512)

Description: 一个sha 哈希密码支撑算法系列的程序 包括了sha1,sha256,sha384和sha512算法-a password support Hash Algorithm series of procedures including sha1, SHA256, SHA384 and SHA512 Algorithm
Platform: | Size: 26149 | Author: 拂晓 | Hits:

[File OperateSHA

Description: SHA加密算法是目前广为应用的重要加密方法之一。而SHA-1 生成 160 位的消息摘要,虽然执行更慢,却被认为更安全。明文消息的最大长度可达到 264 位。下面是网络上流传的SHA算法,我们自己调试了一下,已经通过。现把主函数和算法函数贴出来。
Platform: | Size: 1598 | Author: jinyin | Hits:

[Crack Hacksha-1

Description: 用SHA算法实现对任意文件的hash摘要,并且把hash摘要值(至少为160bit)存入另一个文件,形如: hash inputfile hashvaluefile 说明:SHA算法的实现至少为160bit,或者可以选择256,384或者512的,可以查阅相关资料,按照标准来实现(hash的算法是否正确,可以和网上的标准算法对比,用相同的输入看是否能够得到相同的输出)控制台编程: int main(int argc, char *argv[ ]) -Programme for SHA-1, include the project and .cpp&.h files.Absolutely available
Platform: | Size: 4096 | Author: Heyyou | Hits:

[CA authsha-1

Description: sah-1(Secure Hash Algorithm,安全散列算法)算法源程序-the c sourse code for sha-1(Secure Hash Algorithm) Algorithm
Platform: | Size: 2048 | Author: hehailian | Hits:

[Crack Hacksha-1

Description: 一个非常好的SHA-1源代码,在其目录下建立一个a.txt,将明文保存在a.txt中,在执行SHA-1就行-SHA-1
Platform: | Size: 2048 | Author: xx | Hits:

[Crack HackSHA

Description: PIC汇编实现SHA加密算法。在PIC16F73上实现-SHA ALGORITHM BY PIC assembly language
Platform: | Size: 15360 | Author: chenmao | Hits:

[Crack HackSHA-1

Description: data encryption for SHA-1
Platform: | Size: 271360 | Author: ibanez | Hits:

[Crack HackSHA-1

Description: SHA-1算法实现的详细资料。里面还包括了具体加解密前后的样本例子。-SHA-1 algorithm implementation details. Which also includes specific examples of a sample before and after the encryption and decryption.
Platform: | Size: 197632 | Author: jersey | Hits:

[Data structssha

Description: C实现的SHA-1,SHA-256,SHA-512算法-。
Platform: | Size: 53248 | Author: mcszzz | Hits:

[Linux-UnixSha

Description: This is SHA-1 allgorithmwhich may be used to generate message digests. This is written in C language and runs in Linux environment.
Platform: | Size: 83968 | Author: pratheek19 | Hits:

[CA authHMAC-SHA

Description: hmac using SHA algorithm source code-hmac using SHA algorithm source code...
Platform: | Size: 96256 | Author: anshul khandelwal | Hits:

[Software EngineeringSHA-256(VCsharp)

Description: 应用密码课程设计;VC#2005环境;SHA-256简单功能,显示每次中间哈希结果。-Applied Cryptography course design VC# 2005 environment SHA-256 Simple function, showed intermediate hash result every time.
Platform: | Size: 331776 | Author: bolide | Hits:

[CA authsha

Description: SHA加解密算法,SHA是安全散列算法,c语言实现的Benchmark-SHA encryption and decryption algorithm
Platform: | Size: 27648 | Author: 邓承诺 | Hits:

[Linux-Unixaes-rsa-md5-des-sha

Description: aes rsa md1245 des sha128,244,256(aes rsa md1245 des sha)
Platform: | Size: 2783232 | Author: lanejim | Hits:

[DocumentsSHA-1

Description: 用C语言编写的一个实现SHA-1加密的程序(Using C language to achieve a SHA-1 encryption program)
Platform: | Size: 1024 | Author: 念蕴 | Hits:

[Other安全Hash算法SHA-1的实现

Description: Hash函数是提供数据完整性保障的一个重要工具。本次实验,我们希望通过上机操作,使 同学们对安全Hash算法SHA-1的基本原理有一个全面的理解。通过本次实验,使学生掌握对 Hash函数的应用,为后面数字签名方案的学习打下基础。(The Hash function is an important tool for providing data integrity protection. In this experiment, we hope to have a comprehensive understanding of the basic principles of the security Hash algorithm SHA-1 through the operation of the machine. Through this experiment, the students can grasp the application of the Hash function and lay the foundation for the learning of the later digital signature scheme.)
Platform: | Size: 6144 | Author: 斩月 | Hits:
« 1 23 4 5 6 7 8 9 10 ... 39 »

CodeBus www.codebus.net