Welcome![Sign In][Sign Up]
Location:
Search - SHA-256

Search list

[JSP/Javasha256

Description: SHA 252 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the computed hash (the execution of the algorithm) to a known and expected hash value, a person can determine the data s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their one-way nature: given only a computed hash value, it is generally impossible to derive the original data. SHA-2 includes significant changes its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.-SHA 252 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the computed hash (the execution of the algorithm) to a known and expected hash value, a person can determine the data s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their one-way nature: given only a computed hash value, it is generally impossible to derive the original data. SHA-2 includes significant changes its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.
Platform: | Size: 2048 | Author: siva prasad | Hits:

[JSP/Javasha512

Description: sha 512 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the computed hash (the execution of the algorithm) to a known and expected hash value, a person can determine the data s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their one-way nature: given only a computed hash value, it is generally impossible to derive the original data. SHA-2 includes significant changes its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.-sha 512 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the computed hash (the execution of the algorithm) to a known and expected hash value, a person can determine the data s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their one-way nature: given only a computed hash value, it is generally impossible to derive the original data. SHA-2 includes significant changes its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.
Platform: | Size: 3072 | Author: siva prasad | Hits:

[Linux-Unixsha256-avx-asm

Description: Implement fast SHA-256 with AVX1 instructions.
Platform: | Size: 4096 | Author: zpseibz | Hits:

[Linux-Unixsha256-ssse3-asm

Description: Implement fast SHA-256 with SSSE3 instructions. (x86_64).
Platform: | Size: 4096 | Author: qanminke | Hits:

[Linux-Unixnx-sha256

Description: SHA-256 routines supporting the Power 7+ Nest Accelerators driver.
Platform: | Size: 2048 | Author: 一号俄方 | Hits:

[Linux-Unixsha2-ce-core

Description: sha2-ce-core.S - core SHA-224 SHA-256 transform using v8 Crypto Extensions.
Platform: | Size: 2048 | Author: 蛋糕房 | Hits:

[Linux-Unixsha256-avx2-asm

Description: Implement fast SHA-256 with AVX2 instructions. (x86_64).
Platform: | Size: 5120 | Author: vpgerhei | Hits:

[Linux-Unixsha256

Description: SHA-256 hash implementation and interface.
Platform: | Size: 1024 | Author: gefiefd | Hits:

[Software Engineeringsha256core_latest.tar

Description: Here I upload the VHDL code for SHA-256 encryption and decryption
Platform: | Size: 7168 | Author: qutaiba | Hits:

[VC/MFCsha-256

Description: sha256 哈希算法C++源码,-sha256 hash calculate C++ source1111111111111111
Platform: | Size: 2048 | Author: zhengxm | Hits:

[Other704f876e2830373e3741ea56fcbc0d05

Description: 获取文件的 MD5、CRC、SHA-1、SHA-256、SHA-512
Platform: | Size: 201728 | Author: CXD | Hits:

[Linux-Unixsha2

Description: SHA-256 384 512 Context Structures.
Platform: | Size: 2048 | Author: crflmin | Hits:

[Linux-Unixsha2-ce-glue

Description: sha2-ce-glue.c - SHA-224 SHA-256 using ARMv8 Crypto Extensions.
Platform: | Size: 1024 | Author: krherqp | Hits:

[MPIcuda-sha-256

Description: 非常好用的基于cuda的md5代码,cuda是基于GPU的编程语言,利用cuda的并行性可提高运算破解效率,但随着cuda版本的不断更新,编程环境需要自身搭建,代码需要读懂后根据版本的更新进行简单的调试。- Very good md5 code based on cuda, cuda is a programming language based on GPU, using cuda parallelism can improve the operation efficiency of cracking, but along with the continuous renewal of cuda version, programming environment needs its own building, code needs to read according to the updated version after simple debugging.
Platform: | Size: 8192 | Author: kobe | Hits:

[Software Engineering1

Description: 计算文件的sha-256摘要,并输出到txt,完美-sha-256 digest calculation files, and output to txt
Platform: | Size: 6144 | Author: 呵呵 | Hits:

[Crack Hackhash

Description: 实现MD2, MD5, SHA-1, SHA-256, SHA-384, 和SHA-512加密-Implement MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512 encryption
Platform: | Size: 1024 | Author: 宋哲 | Hits:

[JSP/Javabrix-crypto-js-3.1.9-1-0-g0596fae

Description: CryptoJS (crypto.js) 为 JavaScript 提供了各种各样的加密算法。目前已支持的算法包括: MD5 SHA-1 SHA-256 AES Rabbit MARC4 HMAC HMAC-MD5 HMAC-SHA1 HMAC-SHA256 PBKDF2-var digest Crypto.MD5( Message ) var digestBytes Crypto.MD5( Message , { asBytes: true }) var digestString Crypto.MD5( Message , { asString: true })
Platform: | Size: 102400 | Author: 曹佳顺 | Hits:

[Othercryptopp565

Description: crypto++ 源码, 包括 DES、AES、RSA、SHA-256(crypto++ source code, including DES, AES,RSA and SHA-256.)
Platform: | Size: 4219904 | Author: marlon112 | Hits:

[OtherDataHash

Description: 官方哈希加密算法 % EXAMPLES: % % Default: MD5, hex: % DataHash([]) % 5b302b7b2099a97ba2a276640a192485 % % MD5, Base64: % Opt = struct('Format', 'base64', 'Method', 'MD5'); % DataHash(int32(1:10), Opt) % +tJN9yeF89h3jOFNN55XLg % % SHA-1, Base64: % S.a = uint8([]); % S.b = {{1:10}, struct('q', uint64(415))}; % Opt.Method = 'SHA-1'; % Opt.Format = 'HEX'; % DataHash(S, Opt) % 18672BE876463B25214CA9241B3C79CC926F3093 % % SHA-1 of binary values: % Opt = struct('Method', 'SHA-1', 'Input', 'bin'); % DataHash(1:8, Opt) % 826cf9d3a5d74bbe415e97d4cecf03f445f69225 % % SHA-256, consider ASCII part only (Matlab's CHAR has 16 bits!): % Opt.Method = 'SHA-256'; % Opt.Input = 'ascii'; % DataHash('abc', Opt) % % ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad % % Or equivalently: % Opt.Input = 'bin'; % DataHash(uint8('abc'), Opt)(Official hash encryption algorithm % EXAMPLES: % % Default: MD5, hex: % DataHash([]) % 5b302b7b2099a97ba2a276640a192485 % % MD5, Base64: % Opt = struct('Format', 'base64', 'Method', 'MD5'); % DataHash(int32(1:10), Opt) % +tJN9yeF89h3jOFNN55XLg % % SHA-1, Base64: % S.a = uint8([]); % S.b = {{1:10}, struct('q', uint64(415))}; % Opt.Method = 'SHA-1'; % Opt.Format = 'HEX'; % DataHash(S, Opt) % 18672BE876463B25214CA9241B3C79CC926F3093 % % SHA-1 of binary values: % Opt = struct('Method', 'SHA-1', 'Input', 'bin'); % DataHash(1:8, Opt) % 826cf9d3a5d74bbe415e97d4cecf03f445f69225 % % SHA-256, consider ASCII part only (Matlab's CHAR has 16 bits!): % Opt.Method = 'SHA-256'; % Opt.Input = 'ascii'; % DataHash('abc', Opt) % % ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad % % Or equivalently: % Opt.Input = 'bin'; % DataHash(uint8('abc'), Opt))
Platform: | Size: 6144 | Author: longgyy | Hits:

[Algorithmnew5

Description: 可以用来暴力破解sha-256,也可以分段爆破,ctf常用小工具(Can be used to crack down on SHA-256, or fragmentation, CTF commonly used gadgets.)
Platform: | Size: 4096 | Author: a123456s | Hits:
« 1 2 3 4 5 67 »

CodeBus www.codebus.net