Location:
Search - SHA-256
Search list
Description:
Platform: |
Size: 2048 |
Author: first |
Hits:
Description: php中几种哈希函数的对比,包含MD4、MD5、SHA-1、SHA-256、SHA-384以及SHA-512-php several hash functions in contrast, contains of MD4, MD5, SHA-1, SHA-256, SHA-384 and SHA-512
Platform: |
Size: 15360 |
Author: 张奇 |
Hits:
Description: SHA-256 散列哈希函数 用于数据加密-SHA-256 hash function
Platform: |
Size: 1968128 |
Author: Yao |
Hits:
Description: SHA-1 SHA-256散列算法IP CORE,非常实用-SHA-1 SHA-256 hash algorithm IP CORE, very useful
Platform: |
Size: 141312 |
Author: xiebiwei |
Hits:
Description: 用java代码来实现SHA-256的加密算法-SHA-256 encryption algorithm java code
Platform: |
Size: 4096 |
Author: panda |
Hits:
Description: SHA-256 hash implementation and interface functions.
Platform: |
Size: 4096 |
Author: singeiba |
Hits:
Description: SHA-224 new NIST standard based off of SHA-256 truncated to 224 bits (Tom St Denis).
Platform: |
Size: 1024 |
Author: siuqiuqing |
Hits:
Description: SHA 256 Hash String Source Code for Linux.
Platform: |
Size: 2048 |
Author: cangbiucei |
Hits:
Description: FIPS 180-2 implementation of SHA-256.
Platform: |
Size: 2048 |
Author: xingpencer |
Hits:
Description: sha256的签名算法,纯C实现,已验证正确,在控制台上直接运行即可,-sha256 signature algorithm, pure C implementation ,has been verified properly and can be run directly on the console.
Platform: |
Size: 2048 |
Author: fenghui |
Hits:
Description: 散列算法,用于生成原始消息的数字指纹,本算发基于MATLAB编写,本算法包含多种流行的散列算法,包括SHA1和SHA-256等广泛应用的散列算法,通过本程序,可以对几种广泛应用的散列算法进行调用-Hash algorithm used to generate the digital fingerprint of the original message, this is based on MATLAB, this algorithm contains a variety of popular hash algorithm, including SHA1 and SHA- 256 hash algorithm is widely used, through this program, several widely used hash algorithms can be invoked
Platform: |
Size: 1024 |
Author: 奥巴马 |
Hits:
Description: LTE密钥派生算法,HMAC-SHA-256-key derivation functon for LTE
Platform: |
Size: 13312 |
Author: Flynn |
Hits:
Description: SHA-256加密算法,可计算出字符串或文件的HASH值,带测试程序。-SHA-256 encryption algorithm to calculate the value HASH string or file with the test procedures.
Platform: |
Size: 3072 |
Author: 刘颖兴 |
Hits:
Description: berikut ini adalah sebuah program c untuk sha-256
Platform: |
Size: 2048 |
Author: vandalf |
Hits:
Description: High Throughput Hardware_Software Co-Design Approach for SHA-256 Hashing Cryptographic Module In IPSec_IPv6
Platform: |
Size: 948224 |
Author: sik |
Hits:
Description: SHA 256 block transform for x86 Linux.
Platform: |
Size: 2048 |
Author: hoziusang |
Hits:
Description: FIPS 180-2 implementation of SHA-256.
Platform: |
Size: 2048 |
Author: niuyuiqeng |
Hits:
Description: SHA-256 routines supporting the Power 7+ Nest Accelerators driver.
Platform: |
Size: 3072 |
Author: reiqjvin |
Hits:
Description: ATSHA204
主要特性:
1,SHA-256 Hash算法
2,有保证的唯一的72-bit序列号; DS28CN01 64-bit
不仅有软件加密,内部还有高质量硬件加密。
3,16个槽口的4kbits EEPROM: 4Kbits / 8 = 512Bytes 每个槽口32bytes
4,I2C接口, 单线接口
5, 和Atmel AT88SA102S,AT88SA10HS
6, i2c 地址默认为0xc8; 还可以configuration zone改变地址。-CryptoAuthentication Device Family
Atmel offers the industry s widest selection of hardware authentication and encryption devices. The portfolio is currently comprised of three parts with several others under development. Our CryptoAuthentication devices provide confirmation that hardware and software products are real, which is what authentication is all about. The devices are extremely cost-effective and come in exceptionally small packages.
Platform: |
Size: 535552 |
Author: 张平 |
Hits:
Description: SHA-224 SHA-256 using ARMv8 Crypto Extensions.
Platform: |
Size: 2048 |
Author: kscangzan |
Hits: