Welcome![Sign In][Sign Up]
Location:
Search - SHA-1 Algorithm

Search list

[Mathimatics-Numerical algorithms信息摘要算法示例

Description: MD5/SHA-1摘要生成算法-MD5/SHA-1 Abstract Algorithm
Platform: | Size: 61440 | Author: 李岚 | Hits:

[Other《加密与解密》随书光盘(一)演示

Description: 《加密与解密》第二版电子版 随书光盘(一)演示部分 2003年 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。从光盘上拷贝文件到硬盘时,要注意改变文件属性,取消“只读”属性。-"encryption and decryption," the second edition of the electronic version of books on CD-ROM (a) demonstration of some 2003 in the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology. From the CD copy files to the hard drive, the at
Platform: | Size: 16355328 | Author: 张淼 | Hits:

[Crack Hack加、解密算法大全

Description: 多种加密解密算法包括md2 md5 sha des 等多种加密解密的算法的源代码 并包含简单的使用测试程序-variety of encryption and decryption algorithms, including md2 md5 sha des various encryption and decryption algorithm source code and include the use of a simple test procedure
Platform: | Size: 394240 | Author: zl | Hits:

[Crack HackSHA-1-C

Description: C语言实现的SHA-1报文摘要算法,对学习者来说是一个不错的例子-C language of the SHA-1 digest algorithm, the learners is a good example
Platform: | Size: 168960 | Author: 张三 | Hits:

[Crack Hack(Crypto++)

Description: 几乎涵盖了所有加密算法的源代码3des,md5,rsa,sha……,还带有测试sample,不可多得的好东西。-cover almost all encryption algorithm source code 3des, md5, rsa, sha ... also with a test sample, a very good thing.
Platform: | Size: 962560 | Author: 韩四方 | Hits:

[Crack Hackencryptdll3.7final

Description: 共享软件加密算法库,一款针对个人、企业开发共享软件的加密工具,支持Windows平台下各类开发工具:VC、VB、Delphi、PB、VFP等,算法库集成的算法有:BlowFish、MD5、Secret16、AES、SHA、CRC32、RSA、DES、字符串加/解密、文件加/解密等多种功能强大的算法。其提供了DLL文件-Reg.dll,可以通过复用它来实现数据加密与解密。 -sharing software encryption algorithm library, one individual, enterprise development sharing software encryption tools, support Windows platforms in various types of development tools : Visual C++, Visual Basic, Delphi, PowerBuilder, Visual FoxPro. Integration Algorithm for the algorithm are : BlowFish, MD5, Secret16, AES, SHA, CRC32-, RSA, DES, string encryption/decryption, document encryption/decryption and other powerful algorithms. Provide a DLL files-Reg.dll, through reuse it to achieve data encryption and decryption.
Platform: | Size: 679936 | Author: 沐柏 | Hits:

[File FormatSHA

Description: SHA加密算法是目前广为应用的重要加密方法之一。而SHA-1 生成 160 位的消息摘要,虽然执行更慢,却被认为更安全。明文消息的最大长度可达到 264 位。下面是网络上流传的SHA算法,我们自己调试了一下,已经通过。现把主函数和算法函数贴出来。-SHA encryption algorithm is an important widely used encryption methods. And SHA-1 generates the message digest 160, although more slowly, but think more secure. Explicit messages the maximum length could reach 264. The following is a network spread SHA algorithm, debugging a bit of our own has passed. Are the main functions and algorithms function posted.
Platform: | Size: 1024 | Author: jinyin | Hits:

[Crack Hackcccc-sha1

Description: SHA-1的算法源码,输入一段用户名,输入该用户名的HASH码-SHA-1 algorithm source, enter a period of user name, enter the user name of the HASH code
Platform: | Size: 870400 | Author: eric | Hits:

[JSP/JavaSHA1

Description: sha-1算法的Java实现,可以作为学习sha-1算法的实践参考文档。-sha-1 algorithm realize Java can be used as sha-1 algorithm for learning the practice of reference documentation.
Platform: | Size: 4096 | Author: 木易 | Hits:

[Crack HackSHA-1

Description: SHA-1加密算法源代码.具有完整的加解密过程,性能比较好-SHA-1 encryption algorithm source code. With complete encryption and decryption process, the performance is better
Platform: | Size: 30720 | Author: 朱利 | Hits:

[Crack HackSHA-1

Description: SHA-1算法实现的详细资料。里面还包括了具体加解密前后的样本例子。-SHA-1 algorithm implementation details. Which also includes specific examples of a sample before and after the encryption and decryption.
Platform: | Size: 197632 | Author: jersey | Hits:

[Crack Hacksha1

Description: SHA 1算法软件,代码很全,能运行,界面不错-SHA 1 algorithm software, the code is full, can run
Platform: | Size: 3531776 | Author: 毛辉 | Hits:

[Crack HackSHA1

Description: SHA-1算法的C++实现,方便大家学习-SHA-1 algorithm for C++, so as to facilitate learning
Platform: | Size: 190464 | Author: 崔东岳 | Hits:

[CA authSHA1

Description: SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。-SHA-1
Platform: | Size: 3481600 | Author: 张万东 | Hits:

[Mathimatics-Numerical algorithmsSHA-1

Description: SHA-1算法,单项陷门函数算法-SHA-1 algorithm, single trap door function algorithm ........
Platform: | Size: 5715968 | Author: 李东辉 | Hits:

[Crack HackHMAC-SHA-1

Description: 利用HMAC-SHA-1算法生成加密消息摘要,长度可控制,语言C/C++ -The use of HMAC-SHA-1 algorithm to generate encrypted message digest, the length can be controlled, the language C/C++
Platform: | Size: 21504 | Author: Zn | Hits:

[Crack HackSha-1

Description: 文件、字符串的sha-1算法。 VC2010项目。-Files, strings sha-1 algorithm. VC2010
Platform: | Size: 139264 | Author: 丁志伟 | Hits:

[Crack HackSHA-1

Description: SHA-1的算法实现,可对字符串进行hash-SHA-1 algorithm can hash strings
Platform: | Size: 453632 | Author: hu | Hits:

[Crack HackSHA-1

Description: 密码学 SHA-1算法的代码实现 包括加密和解密过程-Cryptography SHA-1 algorithm code, including encryption and decryption process
Platform: | Size: 2014208 | Author: ChenDL | Hits:

[Other安全Hash算法SHA-1的实现

Description: Hash函数是提供数据完整性保障的一个重要工具。本次实验,我们希望通过上机操作,使 同学们对安全Hash算法SHA-1的基本原理有一个全面的理解。通过本次实验,使学生掌握对 Hash函数的应用,为后面数字签名方案的学习打下基础。(The Hash function is an important tool for providing data integrity protection. In this experiment, we hope to have a comprehensive understanding of the basic principles of the security Hash algorithm SHA-1 through the operation of the machine. Through this experiment, the students can grasp the application of the Hash function and lay the foundation for the learning of the later digital signature scheme.)
Platform: | Size: 6144 | Author: 斩月 | Hits:
« 12 3 4 5 6 7 8 9 10 ... 16 »

CodeBus www.codebus.net