Location:
Search - SHA-256
Search list
Description: 使用VB写的加密算法库,包括Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms (SHA-1, SHA-256, MD2, MD4, MD5, and RipeMD), 还有 Huffman和Base64算法.
Platform: |
Size: 636247 |
Author: |
Hits:
Description: HMAC即带密钥的HASH函数,用它产生的报文鉴别码(MAC)可以实现报文鉴别。这里我将其做成一个软件,用于对文件的合法性进行校验。以下我先简单介绍软件相关背景知识再介绍其代码实现。
-HMAC key is to bring the hash function, used the text of the report identifying code (MAC) can realize the text identification. I am here to create a software for the document verifying the legitimacy. I briefly introduce software-related background knowledge will introduce its implementation of the code.
Platform: |
Size: 50008 |
Author: 杨飞 |
Hits:
Description: SHA 256 加密算法,比 MD5 更好的算法更好的算法,希望对大家有帮助-SHA 256 encryption algorithm, better than the MD5 algorithm better algorithm, we hope to help
Platform: |
Size: 2797 |
Author: 艾伦 |
Hits:
Description: 一个sha 哈希密码支撑算法系列的程序 包括了sha1,sha256,sha384和sha512算法-a password support Hash Algorithm series of procedures including sha1, SHA256, SHA384 and SHA512 Algorithm
Platform: |
Size: 26149 |
Author: 拂晓 |
Hits:
Description: sha码生成电路,包括测试和仿真环境。
sha码生成电路,包括测试和仿真环境。-sha code generator, include test and simulation script。
Platform: |
Size: 135168 |
Author: 谢云松 |
Hits:
Description: 针对文件的Md5值计算 CRC值计算 SHA值计算
的类的使用与DEMO-md5
Platform: |
Size: 384000 |
Author: 陶丹丹 |
Hits:
Description: A code for Secure Hashing
Platform: |
Size: 2048 |
Author: Avijit |
Hits:
Description: SHA 1算法软件,代码很全,能运行,界面不错-SHA 1 algorithm software, the code is full, can run
Platform: |
Size: 3531776 |
Author: 毛辉 |
Hits:
Description: sha-1消息摘要算法c++代码,用于数字签名时将消息加密成固定长的密文。-sha-1 message digest algorithm c++ code, when used for digital signatures into fixed-length messages encrypted ciphertext.
Platform: |
Size: 2048 |
Author: 张 陶 |
Hits:
Description: In cryptography, SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. SHA-2 includes a significant number of changes from its predecessor, SHA-1. SHA-2 consists of a set of four hash functions with digests that are 224, 256, 384 or 512 bits.
Platform: |
Size: 4096 |
Author: monica1987is |
Hits:
Description: 加密芯片选择开发2 -- SHA-256 理解.pdf-Encryption chip select development of 2- SHA-256 to understand. Pdf
Platform: |
Size: 126976 |
Author: sfasdf |
Hits:
Description: implementation for Secure Hash Algorithm 1
SHA-1
in vhdl language
contain no test file.
Platform: |
Size: 14336 |
Author: waleed |
Hits:
Description: 3种安全HASH算法的实现(SHA-1,SHA-256,SHA-512),并对3中算法的性能进行了测试-Achieve 3 kinds of SHA algorithm (SHA-1, SHA-256, SHA-512) and test the performance of them
Platform: |
Size: 1248256 |
Author: Peng |
Hits:
Description: SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-512 (这些有时候也被称做 SHA-2)。-SHA (Secure Hash Algorithm, translated as Secure Hash Algorithm) is the design of the U.S. National Security Agency (NSA), the U.S. National Institute of Standards and Technology (NIST) released a series of cryptographic hash function. The official name for a member of the SHA family, was released in 1993. However, people now give it an informal name of SHA-0 to avoid confusion with its successor. Two years later, SHA-1, the first SHA successor release. In addition there are four variants, once released in order to enhance the range of the output and change some subtle design: SHA-224, SHA-256, SHA-384 and SHA-512 (these are sometimes called SHA-2).
Platform: |
Size: 26624 |
Author: 方东 |
Hits:
Description: 研究ras-256hash函数的结构安全性,给出三个sha-256变种函数,分别分析他们抵抗chabaud-joux攻击的能力与sha-256结构果比较,版权归作者所有,仅供研究。-Structural safety research the ras-256hash function, given three sha-256 variant function analysis their attacks against chabaud-joux ability sha-256 structure if belongs to the author, for research purposes only.
Platform: |
Size: 416768 |
Author: 徐晓刚 |
Hits:
Description: sha is an algorithm for security purposes
Platform: |
Size: 2012160 |
Author: ayyappa |
Hits:
Description: Intel SHA-1和SHA-256汇编代码实现,非常高效。需要使用Intel 自己的ICC编译器编译。VC2010尚不支持。-Intel SHA-1 and SHA-256 Assemble code.
High Performance. Must use Intel ICC
compiler to compile then
Platform: |
Size: 13312 |
Author: sunmike2002 |
Hits:
Description: SHA-1 produces a message digest based on principles similar to those used by Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design.SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256) designed by the U.S. National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard (FIPS).
Platform: |
Size: 24576 |
Author: 李倩 |
Hits:
Description: sha加密解密 通过测试,希望对大家有帮助(Sha encryption and decryption through the test, we want to help)
Platform: |
Size: 2048 |
Author: sdfexz
|
Hits:
Description: aes rsa md1245 des sha128,244,256(aes rsa md1245 des sha)
Platform: |
Size: 2783232 |
Author: lanejim
|
Hits: