Welcome![Sign In][Sign Up]
Location:
Search - SHA-256

Search list

[Crack HackVBCrypto2.zip

Description: 使用VB写的加密算法库,包括Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms (SHA-1, SHA-256, MD2, MD4, MD5, and RipeMD), 还有 Huffman和Base64算法.
Platform: | Size: 636247 | Author: | Hits:

[Crack Hack基于SHA-256的HMAC文件校验器

Description: HMAC即带密钥的HASH函数,用它产生的报文鉴别码(MAC)可以实现报文鉴别。这里我将其做成一个软件,用于对文件的合法性进行校验。以下我先简单介绍软件相关背景知识再介绍其代码实现。 -HMAC key is to bring the hash function, used the text of the report identifying code (MAC) can realize the text identification. I am here to create a software for the document verifying the legitimacy. I briefly introduce software-related background knowledge will introduce its implementation of the code.
Platform: | Size: 50008 | Author: 杨飞 | Hits:

[Crack Hacksha256_encrypt

Description: SHA 256 加密算法,比 MD5 更好的算法更好的算法,希望对大家有帮助-SHA 256 encryption algorithm, better than the MD5 algorithm better algorithm, we hope to help
Platform: | Size: 2797 | Author: 艾伦 | Hits:

[Crack Hacksha(1,256,384,512)

Description: 一个sha 哈希密码支撑算法系列的程序 包括了sha1,sha256,sha384和sha512算法-a password support Hash Algorithm series of procedures including sha1, SHA256, SHA384 and SHA512 Algorithm
Platform: | Size: 26149 | Author: 拂晓 | Hits:

[Othersha_core

Description: sha码生成电路,包括测试和仿真环境。 sha码生成电路,包括测试和仿真环境。-sha code generator, include test and simulation script。
Platform: | Size: 135168 | Author: 谢云松 | Hits:

[Crack Hackhash

Description: 针对文件的Md5值计算 CRC值计算 SHA值计算 的类的使用与DEMO-md5
Platform: | Size: 384000 | Author: 陶丹丹 | Hits:

[Windows DevelopSHA

Description: A code for Secure Hashing
Platform: | Size: 2048 | Author: Avijit | Hits:

[Crack Hacksha1

Description: SHA 1算法软件,代码很全,能运行,界面不错-SHA 1 algorithm software, the code is full, can run
Platform: | Size: 3531776 | Author: 毛辉 | Hits:

[Crack Hacksha1

Description: sha-1消息摘要算法c++代码,用于数字签名时将消息加密成固定长的密文。-sha-1 message digest algorithm c++ code, when used for digital signatures into fixed-length messages encrypted ciphertext.
Platform: | Size: 2048 | Author: 张 陶 | Hits:

[CA authSHA256

Description: In cryptography, SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. SHA-2 includes a significant number of changes from its predecessor, SHA-1. SHA-2 consists of a set of four hash functions with digests that are 224, 256, 384 or 512 bits.
Platform: | Size: 4096 | Author: monica1987is | Hits:

[VHDL-FPGA-Verilogsha256-in-FPGA

Description: 加密芯片选择开发2 -- SHA-256 理解.pdf-Encryption chip select development of 2- SHA-256 to understand. Pdf
Platform: | Size: 126976 | Author: sfasdf | Hits:

[VHDL-FPGA-VerilogHASH-code-implementation-using-VHDL

Description: implementation for Secure Hash Algorithm 1 SHA-1 in vhdl language contain no test file.
Platform: | Size: 14336 | Author: waleed | Hits:

[SCMSHA

Description: 3种安全HASH算法的实现(SHA-1,SHA-256,SHA-512),并对3中算法的性能进行了测试-Achieve 3 kinds of SHA algorithm (SHA-1, SHA-256, SHA-512) and test the performance of them
Platform: | Size: 1248256 | Author: Peng | Hits:

[Algorithm12118029sha(1-256-384-512)

Description: SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-512 (这些有时候也被称做 SHA-2)。-SHA (Secure Hash Algorithm, translated as Secure Hash Algorithm) is the design of the U.S. National Security Agency (NSA), the U.S. National Institute of Standards and Technology (NIST) released a series of cryptographic hash function. The official name for a member of the SHA family, was released in 1993. However, people now give it an informal name of SHA-0 to avoid confusion with its successor. Two years later, SHA-1, the first SHA successor release. In addition there are four variants, once released in order to enhance the range of the output and change some subtle design: SHA-224, SHA-256, SHA-384 and SHA-512 (these are sometimes called SHA-2).
Platform: | Size: 26624 | Author: 方东 | Hits:

[Crack HackSHA-256SecuretyAnalysis

Description: 研究ras-256hash函数的结构安全性,给出三个sha-256变种函数,分别分析他们抵抗chabaud-joux攻击的能力与sha-256结构果比较,版权归作者所有,仅供研究。-Structural safety research the ras-256hash function, given three sha-256 variant function analysis their attacks against chabaud-joux ability sha-256 structure if belongs to the author, for research purposes only.
Platform: | Size: 416768 | Author: 徐晓刚 | Hits:

[Program docSHA-256

Description: sha is an algorithm for security purposes
Platform: | Size: 2012160 | Author: ayyappa | Hits:

[assembly languageintel-sha-extensions_1

Description: Intel SHA-1和SHA-256汇编代码实现,非常高效。需要使用Intel 自己的ICC编译器编译。VC2010尚不支持。-Intel SHA-1 and SHA-256 Assemble code. High Performance. Must use Intel ICC compiler to compile then
Platform: | Size: 13312 | Author: sunmike2002 | Hits:

[CA authSHA

Description: SHA-1 produces a message digest based on principles similar to those used by Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design.SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256) designed by the U.S. National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard (FIPS).
Platform: | Size: 24576 | Author: 李倩 | Hits:

[Crack Hacksha-256

Description: sha加密解密 通过测试,希望对大家有帮助(Sha encryption and decryption through the test, we want to help)
Platform: | Size: 2048 | Author: sdfexz | Hits:

[Linux-Unixaes-rsa-md5-des-sha

Description: aes rsa md1245 des sha128,244,256(aes rsa md1245 des sha)
Platform: | Size: 2783232 | Author: lanejim | Hits:
« 1 2 34 5 6 7 »

CodeBus www.codebus.net