Welcome![Sign In][Sign Up]
Location:
Search - SHA-1 SHA-2

Search list

[Crack Hacksha1

Description: SHA-1加密算法-SHA-1 encryption algorithm
Platform: | Size: 2048 | Author: 张杨 | Hits:

[Crack Hacksha2-1.0

Description: SHA-2 的代码实现-SHA-2 source implementation
Platform: | Size: 65536 | Author: 林叶 | Hits:

[Crack Hacksha(1,256,384,512)

Description: 一个sha 哈希密码支撑算法系列的程序 包括了sha1,sha256,sha384和sha512算法-a password support Hash Algorithm series of procedures including sha1, SHA256, SHA384 and SHA512 Algorithm
Platform: | Size: 25600 | Author: 拂晓 | Hits:

[Crack Hacksha1

Description: 安全加密算法sha-1,又方便的调用接口,可用于普通文件的加密-security encryption algorithm sha-1, convenient call interface can be used for document encryption
Platform: | Size: 96256 | Author: 陈杰 | Hits:

[Crack HackHash-SHA

Description: 密码算法中的单向散列函数之SHA算法的C代码-password algorithm for one-way hash algorithm SHA Function of C code
Platform: | Size: 15360 | Author: WQ | Hits:

[Crack Hacksha256_encrypt

Description: SHA 256 加密算法,比 MD5 更好的算法更好的算法,希望对大家有帮助-SHA 256 encryption algorithm, better than the MD5 algorithm better algorithm, we hope to help
Platform: | Size: 2048 | Author: 艾伦 | Hits:

[Crack Hacksha1

Description: SHA-1 in C By Steve Reid -SHA-1 in CBy Steve Reid
Platform: | Size: 2048 | Author: dlrobin | Hits:

[Crack Hacktest

Description: SHA-1(Secure Hash Algorithm)是美国国家标准局(National Institute of Standard and Technology NIST)为了配合数位签章演算法(Digital Signature Algorithm DSA)的使用所发布的联邦资讯处理标准-FIPS PUB 180-1(Federal Information Processing Standard Publication 180-1),而SHA-1 则是SHA-1 (FIPS180)的改良版,现今与MD5 皆广被使用拿来做密码验证功能.其设计的方法是根据MD4,来对输入的资料讯息(Message)产生出一个160 位元的讯息摘要(Digest) ,对於资料安全性提供了有效的保障.-SHA-1 (Secure Hash Algorithm) is a United States National Bureau of Standards (National Institute of Standard and Technology NIST) in order to tie in with the digital signature algorithm (Digital Signature Algorithm DSA) issued by the use of Federal Information Processing Standard-FIPS PUB 180-1 (Federal Information Processing Standard Publication 180-1), and SHA-1 is SHA-1 (FIPS180) improved version of the current and MD5 are widely used to make the use of password authentication function. its design method is based on MD4, to the input data message (Message) produced a 160-bit message digest (Digest), for data security to provide effective protection.
Platform: | Size: 1024 | Author: zyt | Hits:

[Crack Hacksha

Description: 主流hash函数--sha的源代码,可用于数据签名,是目前应用最广的算法之一-Sha mainstream hash function source code, can be used for data signatures, is the application of the algorithm, one of the most widely
Platform: | Size: 3072 | Author: jiang | Hits:

[Compress-Decompress algrithmsmd5-sha-dec-crypt

Description: 汇聚各种应用密码学密码算法技术源码,包括DEC/SHA/RC4/crypt/md5等-Together a wide range of applications of cryptography cipher technology source, including DEC/SHA/RC4/crypt/md5, etc.
Platform: | Size: 5791744 | Author: karl | Hits:

[Crack HackSHAProj

Description: 以前发的那个只实现了SHA-1, 现在补全了, sha-160, sha-224, sha-256, sha-384, sha-512-Previously issued only to realize that the SHA-1, is now a complete, sha-160, sha-224, sha-256, sha-384, sha-512
Platform: | Size: 70656 | Author: 张鲁夺 | Hits:

[Crack Hacksha

Description: 支持SHA算法,对文件或者字符串进行散列计算,直接可以应用在程序中,形成文件摘要。-To support the SHA algorithm, on paper or string hash calculation can be applied directly in the proceedings, the formation of a document containing a summary.
Platform: | Size: 8192 | Author: 孟庆新 | Hits:

[Crack Hacksha-1

Description: 一个非常好的SHA-1源代码,在其目录下建立一个a.txt,将明文保存在a.txt中,在执行SHA-1就行-SHA-1
Platform: | Size: 2048 | Author: xx | Hits:

[Crack Hacksha2-1.0

Description: SHA-2 (Secure Hash Algorithm 2) hash function, written in C language.
Platform: | Size: 65536 | Author: gKir | Hits:

[Crack Hackcsharp-net-encryption-password-md5-sha-des-rsa.zi

Description: hash md5 RSA Encryption Decryption
Platform: | Size: 34816 | Author: shaheen | Hits:

[SCMSHA

Description: 3种安全HASH算法的实现(SHA-1,SHA-256,SHA-512),并对3中算法的性能进行了测试-Achieve 3 kinds of SHA algorithm (SHA-1, SHA-256, SHA-512) and test the performance of them
Platform: | Size: 1248256 | Author: Peng | Hits:

[Algorithm12118029sha(1-256-384-512)

Description: SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-512 (这些有时候也被称做 SHA-2)。-SHA (Secure Hash Algorithm, translated as Secure Hash Algorithm) is the design of the U.S. National Security Agency (NSA), the U.S. National Institute of Standards and Technology (NIST) released a series of cryptographic hash function. The official name for a member of the SHA family, was released in 1993. However, people now give it an informal name of SHA-0 to avoid confusion with its successor. Two years later, SHA-1, the first SHA successor release. In addition there are four variants, once released in order to enhance the range of the output and change some subtle design: SHA-224, SHA-256, SHA-384 and SHA-512 (these are sometimes called SHA-2).
Platform: | Size: 26624 | Author: 方东 | Hits:

[assembly languageintel-sha-extensions_1

Description: Intel SHA-1和SHA-256汇编代码实现,非常高效。需要使用Intel 自己的ICC编译器编译。VC2010尚不支持。-Intel SHA-1 and SHA-256 Assemble code. High Performance. Must use Intel ICC compiler to compile then
Platform: | Size: 13312 | Author: sunmike2002 | Hits:

[CA authBLAKE2-master

Description: BLAKE2 are cryptographic hash functions based on Dan Bernstein s Cha stream cipher, but a permuted copy of the input block, XORed with some round constants, is added before each Cha round. Like SHA-2, there are two variants differing in the word size. ChaCha operates on a 4×4 array of words. BLAKE repeatedly combines an 8-word hash value with 16 message words, truncating the ChaCha result to obtain the next hash value. BLAKE-256 and BLAKE-224 use 32-bit words and those output digest size are 256 bits and 224 bits, while BLAKE-512 and BLAKE-384 use 64-bit words and those output digest size are 512 bits and 384 bits.-BLAKE2 are cryptographic hash functions based on Dan Bernstein s ChaCha stream cipher, but a permuted copy of the input block, XORed with some round constants, is added before each ChaCha round. Like SHA-2, there are two variants differing in the word size. ChaCha operates on a 4×4 array of words. BLAKE repeatedly combines an 8-word hash value with 16 message words, truncating the ChaCha result to obtain the next hash value. BLAKE-256 and BLAKE-224 use 32-bit words and those output digest size are 256 bits and 224 bits, while BLAKE-512 and BLAKE-384 use 64-bit words and those output digest size are 512 bits and 384 bits.
Platform: | Size: 497664 | Author: Jonathan Young | Hits:

[Crack HackMD5Encrypt

Description: MD5算法具有以下特点: 1、压缩性:任意长度的数据,算出的MD5值长度都是固定的。 2、容易计算:从原数据计算出MD5值很容易。 3、抗修改性:对原数据进行任何改动,哪怕只修改1个字节,所得到的MD5值都有很大区别。 4、强抗碰撞:已知原数据和其MD5值,想找到一个具有相同MD5值的数据(即伪造数据)是非常困难的。 MD5的作用是让大容量信息在用数字签名软件签署私人密钥前被"压缩"成一种保密的格式(就是把一个任意长度的字节串变换成一定长的十六进制数字串)。除了MD5以外,其中比较有名的还有sha-1、RIPEMD以及Haval等。(The MD5 algorithm has the following characteristics: 1: compression of arbitrary length data, calculate the MD5 value of the length is fixed. 2, easy to calculate: from raw data to calculate the value of MD5 is very easy. 3, anti modification: any modifications to the original data, even if only to modify 1 bytes, the MD5 values are very different. 4, strong anti collision: known as original data and its MD5 value, want to find someone with the same MD5 value of the data (i.e. data falsification) is very difficult. The role of MD5 is to make the large capacity information in the private key is signed with a digital signature software are compressed into a confidential format (is an arbitrary length byte string transform into a long string of sixteen hexadecimal numbers). In addition to MD5, one of the more famous are SHA-1, RIPEMD and Haval.)
Platform: | Size: 21504 | Author: Sky_Vico | Hits:
« 12 3 4 5 6 7 8 9 10 ... 17 »

CodeBus www.codebus.net