Welcome![Sign In][Sign Up]
Location:
Search - SHA

Search list

[JSP/JavaJavashixianDESRSAsuanfa

Description: Java加密组件实现DES、RSA和SHA加密算法 可以直接导入工程使用-Java Component Implementation encryption DES, RSA and SHA encryption algorithm can be used directly into the project
Platform: | Size: 35840 | Author: zhang | Hits:

[Mathimatics-Numerical algorithmscca

Description: Fei Sha 等人编写的流形学习算法CCA的matlab代码,它基于MVU算法,但是计算速度比较慢-Fei Sha and others prepared CCA manifold learning algorithm of matlab code, which is based on MVU algorithm, but the calculation speed is relatively slow
Platform: | Size: 16384 | Author: Chenping Hou | Hits:

[VHDL-FPGA-Verilogsha-1

Description: 本算法基于leon2协处理器接口标准,内含testbench,在modelsim中仿真通过,在ise9.2中综合及后仿真通过。-The algorithm is based on the leon2 co-processor interface standard, including testbench, ModelSim simulation in the adoption, in ise9.2 integrated and adopted after the simulation.
Platform: | Size: 15360 | Author: ninghuiming | Hits:

[File OperateFileVerifier

Description: FileVerifier++是一款Windows功能软件,它用于计算文件的hash值(算法包括:CRC32,MD5,SHA-1,SHA-256/224/384/512,WHIRLPOOL,以及RIPEMD-128/160/256/320)。支持的hash文件格式包括MD5SUM .MD5, SFV, BSD CKSUM, 以及其他格式。-FileVerifier++ Software is a Windows feature, it used to calculate the hash value of files (including algorithms: CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, as well as RIPEMD-128/160/256/320). Hash file format support including MD5SUM. MD5, SFV, BSD CKSUM, as well as other formats.
Platform: | Size: 1241088 | Author: bestcode | Hits:

[Windows DevelopDataSecure

Description: sha-512,sha-256,等的C实现,内附 官方参考和整理参考.包括最流行的md5 算法源码 sha512是最新版本的美国国家安全局所设计的算法.本代码支持任意大小的字符串或文件(<2GB,可以改到4GB,8GB...).-sha-512, sha-256, such as the C to achieve, enclosing the official reference and collate reference. including the most popular source md5 algorithm sha512 is the latest version of the U.S. National Security Agency designed algorithms. this code to support any size of string or document (<2GB, can be changed to a 4GB, 8GB ...).
Platform: | Size: 374784 | Author: jkl | Hits:

[Crack HackJavaEncryptModule

Description: 用Java实现的DES、RSA和SHA算法。Eclipse开发。-Java achieved by DES, RSA and SHA algorithm. Eclipse development.
Platform: | Size: 30720 | Author: zack fair | Hits:

[Crack Hackjiamisuanfa_delphi

Description: delphi实现加密算法 CRC32-Dym.................CRC32算法动态码表实现 \CRC32-Static..............CRC32算法静态码表实现 \MD5.......................MD5算法示例 \SHA.......................SHA算法示例 \DES.......................DES算法示例 \2DES......................双重DES算法示例 \3DES......................两个密钥的三重DES算法示例 \3DES3.....................三个密钥的三重DES算法示例 \Blowfish..................BlowFish算法示例 \AES.......................AES算法示例 \RSA.......................RSA算法示例 \BASE64....................BASE64算法示例-delphi encryption algorithm to achieve CRC32-Dym ................. CRC32 algorithm to achieve dynamic code table CRC32-Static .............. CRC32 algorithm for static code table to achieve sample MD5 ....................... MD5 algorithm SHA ................... Example .... SHA algorithm DES ....................... DES algorithm example DES ............... DES algorithm sample ....... double DES ...................... two key examples of triple-DES algorithm DES3 ...... ............... three key triple DES algorithm Blowfish .................. BlowFish sample sample algorithm AES ... .................... AES algorithm RSA ....................... RSA algorithm Example Example BASE64 .................... BASE64 algorithm sample
Platform: | Size: 2724864 | Author: 王刚 | Hits:

[JSP/Javasha1.jar

Description: SHA加密算法打包文件,电子商务可能会用到此算法加密,去掉后缀“.rar”使用-SHA encryption algorithm packaged documents, e-commerce may be encrypted using this algorithm, remove the suffix " . Rar" use
Platform: | Size: 19456 | Author: | Hits:

[Crack Hackfork256

Description: the hash function FORK-256,256位的安全散列验证算法,SHA-256的替代者。-the hash function FORK-256,256-bit secure hash authentication algorithm, SHA-256 replacement for him.
Platform: | Size: 2048 | Author: yuisikyo | Hits:

[JSP/Javalab1

Description: 提供JAVA源码,加密解密4种算法,AES, DES ,RSA ,SHA-1,-Provide JAVA source, four kinds of encryption algorithm, AES, DES, RSA, SHA-1,
Platform: | Size: 13312 | Author: shangguan | Hits:

[Crack Hacksha-1

Description: sha-1加密源码 sha-1加密源码-sha-1 encryption source code sha-1 encryption sha-1 encryption source
Platform: | Size: 4096 | Author: blueyang | Hits:

[Crack HackElgamal

Description: 本项目实现Elgalma体制的加解密,公私钥生成后分别放于不同的文件中。用该密码体制实现了对任意数据类型的加解密以及实现了数据签名验证算法。本项目中我实现的是32位的算法。其中,数字签名验证算法是对hash摘要值(SHA-1算法产生的)进行签名,并进行验证。-The project implementation Elgalma system encryption and decryption, public and private key to generate, after put in a different file. Cryptosystem with the implementation of arbitrary data types as well as the implementation of encryption and decryption of data Signature verification algorithm. I realize this project are the 32 algorithms. Among them, the digital signature verification algorithm is a summary hash value (SHA-1 algorithm generated) for signatures, and verify it.
Platform: | Size: 4096 | Author: 蔡吉欣 | Hits:

[OtherSHAHashalgorithm

Description: SHA Hash algorithm. This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA- 512.
Platform: | Size: 179200 | Author: pccc | Hits:

[Crack Hackencryption_test

Description: 实现通信过程中的数据加密(AES, DES, SHA-256,SHA-384,SHA512, RSA)。 测试加解密效率等-To achieve communication in the process of data encryption (AES, DES, SHA-256, SHA-384, SHA512, RSA). Encryption and decryption efficiency test
Platform: | Size: 94208 | Author: BY | Hits:

[WEB CodeSHA

Description: hash算法 This VBScript ASP file tests the accompanying SHA256.asp for generating digests of strings.-hash algorithm This VBScript ASP file tests the accompanying SHA256.asp for generating digests of strings.
Platform: | Size: 8192 | Author: tll | Hits:

[Crack Hacksha

Description: 内带3个sha1的C源码。经验证都可用。在我们项目中,已经用于验证SHA1的verilog-With three within the C source code sha1. Experience certificate are available. In our project, has been used to validate SHA1 of verilog
Platform: | Size: 14336 | Author: 左宏权 | Hits:

[JSP/Javasha256.java

Description: Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
Platform: | Size: 3072 | Author: patataman | Hits:

[Crack Hacksha

Description: 一个sha 哈希密码支撑算法系列的程序 包括了sha1-Support for a password hash algorithm sha series of procedures including sha1
Platform: | Size: 4096 | Author: | Hits:

[CSharpSHA-1_C

Description: sha-1 哈希函数的c++算法的实现,这是我以前参与的论文,请参考。-sha-1 hash function of the c++ algorithm, which is involved in my previous paper, please refer to.
Platform: | Size: 159744 | Author: 孙翰墨 | Hits:

[Crack Hackd2

Description: 利用HASH(采用sha-1算法)算法原理,设计数字签名的水印算法,完成嵌入、(提取)验证,-Use HASH (using sha-1 algorithm) algorithm, design of watermarking algorithms digital signature to complete the embedding, (extract) authentication,
Platform: | Size: 34816 | Author: 尉玉林 | Hits:
« 1 2 3 4 5 67 8 9 10 11 ... 39 »

CodeBus www.codebus.net