Welcome![Sign In][Sign Up]
Location:
Search - SHA hash

Search list

[Program docSECURE HASH STANDARD (sha)

Description: SHA 加密算法标准说明文件, 详细介绍相关的算法
Platform: | Size: 177824 | Author: liukai@tenx.com.tw | Hits:

[Crack Hacksha(1,256,384,512)

Description: 一个sha 哈希密码支撑算法系列的程序 包括了sha1,sha256,sha384和sha512算法-a password support Hash Algorithm series of procedures including sha1, SHA256, SHA384 and SHA512 Algorithm
Platform: | Size: 25600 | Author: 拂晓 | Hits:

[Crack Hacksha-1

Description: SHA-1Hash函数源码,可以对任何文件做Hash,得到的Hash值为160位。具有抗强碰撞,弱碰撞等能力。虽然王小云已经找到了个别碰撞。但在新的好的hash函数出来之前仍将被广泛使用。-SHA-1Hash function source, any document can be done right hash, the hash value of 160. Anti-collision, the weak capabilities of the collision. Although Bruce Schneier, had found individual collisions. But the new good hash function will be out before widespread use.
Platform: | Size: 27648 | Author: 王国维 | Hits:

[Crack Hack基于SHA-256的HMAC文件校验器

Description: HMAC即带密钥的HASH函数,用它产生的报文鉴别码(MAC)可以实现报文鉴别。这里我将其做成一个软件,用于对文件的合法性进行校验。以下我先简单介绍软件相关背景知识再介绍其代码实现。 -HMAC key is to bring the hash function, used the text of the report identifying code (MAC) can realize the text identification. I am here to create a software for the document verifying the legitimacy. I briefly introduce software-related background knowledge will introduce its implementation of the code.
Platform: | Size: 50176 | Author: 杨飞 | Hits:

[Crack HackHash-SHA

Description: 密码算法中的单向散列函数之SHA算法的C代码-password algorithm for one-way hash algorithm SHA Function of C code
Platform: | Size: 15360 | Author: WQ | Hits:

[File Formathash

Description: 主要关于hash算法的一些资料,个人觉得比较好,与大家共享-Hash algorithm is mainly concerned with some of the information, individuals feel better, and the U.S. share
Platform: | Size: 4294656 | Author: 张晓梅 | Hits:

[WEB Codesha-1

Description: 我自己用javascript实现的sha-1散列函数,对要在web客户端要进行单向加密的情况应该很有帮助-I am using javascript to achieve the sha-1 hash function, and in the web client to conduct a one-way encryption of the situation should be very helpful
Platform: | Size: 2048 | Author: 罗小江 | Hits:

[Windows Developshs2

Description: SECURE HASH STANDARD (SHS)使用160-bit SHA 散列算法,主要用于数字签名 DSA-SECURE HASH STANDARD (SHS) using 160-bit SHA hash algorithm, mainly used for digital signature DSA
Platform: | Size: 14336 | Author: zxang | Hits:

[Crack Hackhash

Description: 这是一个用matlab写的hash函数,相信对用matlab做实验仿真的同学有所帮助-This is a hash function written in matlab, I believe that using matlab simulation experiments help students
Platform: | Size: 1024 | Author: 王量 | Hits:

[Crack Hacktest

Description: SHA-1(Secure Hash Algorithm)是美国国家标准局(National Institute of Standard and Technology NIST)为了配合数位签章演算法(Digital Signature Algorithm DSA)的使用所发布的联邦资讯处理标准-FIPS PUB 180-1(Federal Information Processing Standard Publication 180-1),而SHA-1 则是SHA-1 (FIPS180)的改良版,现今与MD5 皆广被使用拿来做密码验证功能.其设计的方法是根据MD4,来对输入的资料讯息(Message)产生出一个160 位元的讯息摘要(Digest) ,对於资料安全性提供了有效的保障.-SHA-1 (Secure Hash Algorithm) is a United States National Bureau of Standards (National Institute of Standard and Technology NIST) in order to tie in with the digital signature algorithm (Digital Signature Algorithm DSA) issued by the use of Federal Information Processing Standard-FIPS PUB 180-1 (Federal Information Processing Standard Publication 180-1), and SHA-1 is SHA-1 (FIPS180) improved version of the current and MD5 are widely used to make the use of password authentication function. its design method is based on MD4, to the input data message (Message) produced a 160-bit message digest (Digest), for data security to provide effective protection.
Platform: | Size: 1024 | Author: zyt | Hits:

[Data structsHASH

Description: 扫描一个C源程序,用Hash表存储该程序中出现的关键字,并统计该程序中的关键字出现频度。用线性探测法解决Hash冲突。设Hash函数为: Hash(key)=[(key的第一个字母序号)*100+(key的最后一个字母序号)] MOD 41-Scan a C source program, using Hash Table to store the keywords appear in the procedure, and statistical procedures in the frequency of the keyword appears. Linear detection method to resolve the conflict Hash. Based Hash function: Hash (key) = [(key the first letter of the serial number)* 100+ (Key serial number of the last letter)] MOD 41
Platform: | Size: 9216 | Author: zhang | Hits:

[Crack Hacksha

Description: 主流hash函数--sha的源代码,可用于数据签名,是目前应用最广的算法之一-Sha mainstream hash function source code, can be used for data signatures, is the application of the algorithm, one of the most widely
Platform: | Size: 3072 | Author: jiang | Hits:

[Crack Hacksha

Description: 支持SHA算法,对文件或者字符串进行散列计算,直接可以应用在程序中,形成文件摘要。-To support the SHA algorithm, on paper or string hash calculation can be applied directly in the proceedings, the formation of a document containing a summary.
Platform: | Size: 8192 | Author: 孟庆新 | Hits:

[Crack HackSHA-1

Description: SHA-1算法的C语言实现,计算消息的散列值,用于安全通信-SHA-1 algorithm of the C language implementation, computing the hash value information for secure communications
Platform: | Size: 89088 | Author: zhaolingxi | Hits:

[OtherSHAHashalgorithm

Description: SHA Hash algorithm. This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA- 512.
Platform: | Size: 179200 | Author: pccc | Hits:

[Crack Hacksha-1

Description: 用SHA算法实现对任意文件的hash摘要,并且把hash摘要值(至少为160bit)存入另一个文件,形如: hash inputfile hashvaluefile 说明:SHA算法的实现至少为160bit,或者可以选择256,384或者512的,可以查阅相关资料,按照标准来实现(hash的算法是否正确,可以和网上的标准算法对比,用相同的输入看是否能够得到相同的输出)控制台编程: int main(int argc, char *argv[ ]) -Programme for SHA-1, include the project and .cpp&.h files.Absolutely available
Platform: | Size: 4096 | Author: Heyyou | Hits:

[WEB CodeSHA

Description: hash算法 This VBScript ASP file tests the accompanying SHA256.asp for generating digests of strings.-hash algorithm This VBScript ASP file tests the accompanying SHA256.asp for generating digests of strings.
Platform: | Size: 8192 | Author: tll | Hits:

[CA authsha-1

Description: sah-1(Secure Hash Algorithm,安全散列算法)算法源程序-the c sourse code for sha-1(Secure Hash Algorithm) Algorithm
Platform: | Size: 2048 | Author: hehailian | Hits:

[JSP/Javasha256.java

Description: Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
Platform: | Size: 3072 | Author: patataman | Hits:

[OS programhash

Description: 求所有主流Hash值的程序,包括MD5,sha等-Hash value for all major procedures, including MD5, sha, etc.
Platform: | Size: 9042944 | Author: tz1985 | Hits:
« 12 3 4 5 6 7 8 9 10 »

CodeBus www.codebus.net