Welcome![Sign In][Sign Up]
Location:
Search - SHA-512

Search list

[Crack Hackjssha2-0.3

Description: javascript实现的SHA-256-384-512 hash算法
Platform: | Size: 9459 | Author: tony | Hits:

[Crack HackDSA

Description: Digital Signature Algorithm (DSA)是Schnorr和ElGamal签名算法的变种,被美国NIST作为DSS(DigitalSignature Standard)。算法中应用了下述参数: p:L bits长的素数。L是64的倍数,范围是512到1024; q:p - 1的160bits的素因子; g:g = h^((p-1)/q) mod p,h满足h < p - 1, h^((p-1)/q) mod p > 1; x:x < q,x为私钥 ; y:y = g^x mod p ,( p, q, g, y )为公钥; H( x ):One-Way Hash函数。DSS中选用SHA( Secure Hash Algorithm )。 p, q, g可由一组用户共享,但在实际应用中,使用公共模数可能会带来一定的威胁。签名及验证协议如下: 1. P产生随机数k,k < q; 2. P计算 r = ( g^k mod p ) mod q s = ( k^(-1) (H(m) + xr)) mod q 签名结果是( m, r, s )。 3. 验证时计算 w = s^(-1)mod q u1 = ( H( m ) * w ) mod q u2 = ( r * w ) mod q v = (( g^u1 * y^u2 ) mod p ) mod q 若v = r,则认为签名有效。   DSA是基于整数有限域离散对数难题的,其安全性与RSA相比差不多。DSA的一个重要特点是两个素数公开,这样,当使用别人的p和q时,即使不知道私钥,你也能确认它们是否是随机产生的,还是作了手脚。RSA算法却作不到。
Platform: | Size: 136954 | Author: wildkaede | Hits:

[Crack Hackjssha2-0.3

Description: javascript实现的SHA-256-384-512 hash算法-javascript realize the SHA-256-384-512 hash algorithm
Platform: | Size: 9216 | Author: tony | Hits:

[Crack HackDSA

Description: Digital Signature Algorithm (DSA)是Schnorr和ElGamal签名算法的变种,被美国NIST作为DSS(DigitalSignature Standard)。算法中应用了下述参数: p:L bits长的素数。L是64的倍数,范围是512到1024; q:p - 1的160bits的素因子; g:g = h^((p-1)/q) mod p,h满足h < p - 1, h^((p-1)/q) mod p > 1; x:x < q,x为私钥 ; y:y = g^x mod p ,( p, q, g, y )为公钥; H( x ):One-Way Hash函数。DSS中选用SHA( Secure Hash Algorithm )。 p, q, g可由一组用户共享,但在实际应用中,使用公共模数可能会带来一定的威胁。签名及验证协议如下: 1. P产生随机数k,k < q; 2. P计算 r = ( g^k mod p ) mod q s = ( k^(-1) (H(m) + xr)) mod q 签名结果是( m, r, s )。 3. 验证时计算 w = s^(-1)mod q u1 = ( H( m ) * w ) mod q u2 = ( r * w ) mod q v = (( g^u1 * y^u2 ) mod p ) mod q 若v = r,则认为签名有效。   DSA是基于整数有限域离散对数难题的,其安全性与RSA相比差不多。DSA的一个重要特点是两个素数公开,这样,当使用别人的p和q时,即使不知道私钥,你也能确认它们是否是随机产生的,还是作了手脚。RSA算法却作不到。
Platform: | Size: 136192 | Author: wildkaede | Hits:

[Linux-UnixPGP.Corporation.PGP.SDK.v3.7.2.ccrun.044998

Description: PGP SDK 包括大范围的标准加密、数字签名和编解码技术,以及各种网络安全协议执行程序。PGP SDK为开发人员提供同其他PGP产品核心相同的核加密功能。 PGP SDK技术说明:PGP SDK是我们的加密和密钥管理库的C接口,支持以下平台: · Windows 98, Millennium (ME), NT, 2000, and XP · Mac OS X · Linux x86 with 2.0.x kernel or later · Sun Solaris SPARC 2.5.1, 2.6, 2.7, or 2.8 -PGP SDK支持下列算法: · Ciphers o IDEA o TripleDES o CAST5 o AES (128-, 182-, 256-bit密钥长度) o Twofish (256-bit 密钥长度) · Hashes o MD5 o SHA-1 o RIPEMD160 o SHA-2 (256-, 384-, 512-bit 密钥长度) · Public Key Algorithms o RSA o Diffie-Hellman o DSA
Platform: | Size: 14045184 | Author: guangmingniu | Hits:

[Crack HackFileVerifierPP_v0.6.6.6050_src

Description: FileVerifier++是一款Windows功能软件,它用于计算文件的hash值(算法包括:CRC32,MD5,SHA-1,SHA-256/224/384/512,WHIRLPOOL,以及RIPEMD-128/160/256/320)。支持的hash文件格式包括MD5SUM .MD5, SFV, BSD CKSUM, 以及其他格式。-FileVerifier++ is a Windows utility for calculating hashes using a number of algorithms including CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, and RIPEMD-128/160/256/320. Supported hash file formats include MD5SUM .MD5, SFV, BSD CKSUM, and others.
Platform: | Size: 4412416 | Author: 王彦之 | Hits:

[Crack Hackmd5

Description: MD5 哈希算法.MD5是由国际著名密码学家、“图灵奖”获得者兼公钥加密算法RSA的创始人、麻省理工大学的RonaldRivest教授于1991年设计的。它与SHA共同构成两大哈希算法,广泛应用于金融、证券等电子商务领域。MD5输入是任意长的消息,分组长度为512比特,输出128比特。-MD5 hash algorithm. MD5 password by internationally renowned scientists, " Turing Award" winner and founder of RSA public key encryption algorithms, MIT professor of RonaldRivest designed in 1991. With the two together constitute the SHA hash algorithm, widely used in finance, securities and other e-commerce. MD5 is a message of arbitrary length input, packet length is 512 bits, 128 bits output.
Platform: | Size: 1172480 | Author: 汪旭 | Hits:

[Othersha512

Description: 用C实现的512位的SHA程序,在CFree上可以正确的运行-512 C implementation of the SHA program run correctly on CFree
Platform: | Size: 3072 | Author: 李正东 | Hits:

[Crack Hacksha512

Description: SHA 512 algorthm using c++language
Platform: | Size: 2048 | Author: Durga | Hits:

[Linux-UnixLongDigest

Description: Base class for SHA-384 and SHA-512.
Platform: | Size: 3072 | Author: jeimeive | Hits:

[Linux-Unixnx-sha512

Description: SHA-512 routines supporting the Power 7+ Nest Accelerators driver.
Platform: | Size: 3072 | Author: xucbqv | Hits:

[Linux-Unixsha512-avx-asm

Description: Implement fast SHA-512 with AVX instructions. (x86_64).
Platform: | Size: 5120 | Author: ksrtzao | Hits:

[Linux-Unixsha512-ssse3-asm

Description: Implement fast SHA-512 with SSSE3 instructions. (x86_64).
Platform: | Size: 5120 | Author: pkkdgui | Hits:

[JSP/Javasha256

Description: SHA 252 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the computed hash (the execution of the algorithm) to a known and expected hash value, a person can determine the data s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their one-way nature: given only a computed hash value, it is generally impossible to derive the original data. SHA-2 includes significant changes its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.-SHA 252 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the computed hash (the execution of the algorithm) to a known and expected hash value, a person can determine the data s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their one-way nature: given only a computed hash value, it is generally impossible to derive the original data. SHA-2 includes significant changes its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.
Platform: | Size: 2048 | Author: siva prasad | Hits:

[JSP/Javasha512

Description: sha 512 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the computed hash (the execution of the algorithm) to a known and expected hash value, a person can determine the data s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their one-way nature: given only a computed hash value, it is generally impossible to derive the original data. SHA-2 includes significant changes its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.-sha 512 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the computed hash (the execution of the algorithm) to a known and expected hash value, a person can determine the data s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their one-way nature: given only a computed hash value, it is generally impossible to derive the original data. SHA-2 includes significant changes its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.
Platform: | Size: 3072 | Author: siva prasad | Hits:

[Linux-Unixsha512_generic

Description: SHA-512 code by Jean-Luc Cooke for Linux v2.13.6.
Platform: | Size: 3072 | Author: mglmmi | Hits:

[Linux-Unixnx-sha512

Description: SHA-512 routines supporting the Power 7+ Nest Accelerators driver.
Platform: | Size: 2048 | Author: qtnonfd | Hits:

[Linux-Unixsha512-armv7-neon

Description: sha512-armv7-neon.S - ARM NEON assembly implementation of SHA-512 transform.
Platform: | Size: 3072 | Author: bodgwa | Hits:

[Other704f876e2830373e3741ea56fcbc0d05

Description: 获取文件的 MD5、CRC、SHA-1、SHA-256、SHA-512
Platform: | Size: 201728 | Author: CXD | Hits:

[Crack Hackhash

Description: 实现MD2, MD5, SHA-1, SHA-256, SHA-384, 和SHA-512加密-Implement MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512 encryption
Platform: | Size: 1024 | Author: 宋哲 | Hits:
« 1 2 34 »

CodeBus www.codebus.net