Welcome![Sign In][Sign Up]
Location:
Search - SHA-256

Search list

[Crack HackSHA256

Description: sha256。256位的sha哈希函数算法,将明文进行散列加密处理。
Platform: | Size: 10084 | Author: 于磊 | Hits:

[Linux-UnixPGP.Corporation.PGP.SDK.v3.7.2.ccrun.044998

Description: PGP SDK 包括大范围的标准加密、数字签名和编解码技术,以及各种网络安全协议执行程序。PGP SDK为开发人员提供同其他PGP产品核心相同的核加密功能。 PGP SDK技术说明:PGP SDK是我们的加密和密钥管理库的C接口,支持以下平台: · Windows 98, Millennium (ME), NT, 2000, and XP · Mac OS X · Linux x86 with 2.0.x kernel or later · Sun Solaris SPARC 2.5.1, 2.6, 2.7, or 2.8 -PGP SDK支持下列算法: · Ciphers o IDEA o TripleDES o CAST5 o AES (128-, 182-, 256-bit密钥长度) o Twofish (256-bit 密钥长度) · Hashes o MD5 o SHA-1 o RIPEMD160 o SHA-2 (256-, 384-, 512-bit 密钥长度) · Public Key Algorithms o RSA o Diffie-Hellman o DSA
Platform: | Size: 14045184 | Author: guangmingniu | Hits:

[Crack Hack123

Description: 针对DTCP内容保护协议,本文通过分析协议使用的密码算法,提出安全散列函数SHA一1、SHA一256,AES高级加密算法,素数域椭圆曲线点乘算法的硬件实现方法,有效地满足了DTCP内容保护协议对设备验证、传输数据加密的需求。-Aimed at DTCP content protection agreement, the paper analyzes agreement using cryptographic algorithms, puts forward secure hash function SHA one 1, SHA a 256, AES encryption algorithm, prime fields senior elliptic curve point multiply algorithm, the hardware realization method effectively meet the DTCP content protection of equipment, validation, transmission protocol data encryption demand.
Platform: | Size: 4477952 | Author: 孙丽娟 | Hits:

[Crack Hackbouncycastle

Description: bouncycastle 一个开源的 java 包,可以提供一些加密算法的实现. 使用这个包进行 DES AES RSA SHA ECG SHA MD5 等加密算法 .算法不像jre里面哪有有限制,是可以使用 256 位密钥 android 里面的加密算法就是使用这个包 ! 适合一些不想依赖于 jre 加密实现的或者没有该环境的软件 .-<bouncycastle> an open source java package can provide encryption algorithm implementation using this package for AES and other encryption algorithms can use the 256 key android inside the encryption algorithm is the use of this package!
Platform: | Size: 1707008 | Author: crw | Hits:

[CA authBLAKE2-master

Description: BLAKE2 are cryptographic hash functions based on Dan Bernstein s Cha stream cipher, but a permuted copy of the input block, XORed with some round constants, is added before each Cha round. Like SHA-2, there are two variants differing in the word size. ChaCha operates on a 4×4 array of words. BLAKE repeatedly combines an 8-word hash value with 16 message words, truncating the ChaCha result to obtain the next hash value. BLAKE-256 and BLAKE-224 use 32-bit words and those output digest size are 256 bits and 224 bits, while BLAKE-512 and BLAKE-384 use 64-bit words and those output digest size are 512 bits and 384 bits.-BLAKE2 are cryptographic hash functions based on Dan Bernstein s ChaCha stream cipher, but a permuted copy of the input block, XORed with some round constants, is added before each ChaCha round. Like SHA-2, there are two variants differing in the word size. ChaCha operates on a 4×4 array of words. BLAKE repeatedly combines an 8-word hash value with 16 message words, truncating the ChaCha result to obtain the next hash value. BLAKE-256 and BLAKE-224 use 32-bit words and those output digest size are 256 bits and 224 bits, while BLAKE-512 and BLAKE-384 use 64-bit words and those output digest size are 512 bits and 384 bits.
Platform: | Size: 497664 | Author: Jonathan Young | Hits:
« 1 2 3 4 5 6 7»

CodeBus www.codebus.net