Welcome![Sign In][Sign Up]
Location:
Search - sha 1

Search list

[Crack Hackcccc-sha1

Description: SHA-1的算法源码,输入一段用户名,输入该用户名的HASH码
Platform: | Size: 11643 | Author: eric | Hits:

[Crack HackFreeOTFE_2_00_src

Description: 文件驱动加密,功能强大,可产生加密分区,支持AES,MD2,MD4,MD5MD2, MD4, MD5, RIPEMD-128, RIPEMD-160, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512.
Platform: | Size: 3542931 | Author: zengzh15 | Hits:

[Crack Hacksha

Description: 主流hash函数--sha的源代码,可用于数据签名,是目前应用最广的算法之一
Platform: | Size: 3203 | Author: jiang | Hits:

[Crack HackSHAProj

Description: 以前发的那个只实现了SHA-1, 现在补全了, sha-160, sha-224, sha-256, sha-384, sha-512
Platform: | Size: 70582 | Author: 张鲁夺 | Hits:

[SourceCode数字签名系统

Description: 生成公钥和私钥用于加密。采用md5和sha-1摘要算法。加密使用rsa算法
Platform: | Size: 487420 | Author: fanfan_joy@hotmail.com | Hits:

[Crack Hackcryptix_src_3-1-2

Description: 另一个使用java编写的加密通用算法包,含des,rsa,sha,md5,md4,md2,idea,blowfish等很多加密算法和密钥存储、签名等源码- Another uses the java compilation the encryption general algorithm package, contains des, rsa, sha, md5, md4, md2, idea, blowfish and so on the very many encryption algorithm and the key saves, source code and so on the signature
Platform: | Size: 2530304 | Author: 站长 | Hits:

[JSP/JavaDES-and-RSA-and-SHA-encryption

Description: DES RSA SHA encryption algorithm implemented by JAVA
Platform: | Size: 36864 | Author: jack | Hits:

[Crack HackSHA256

Description: 一个ASP的SHA256加密算法-an ASP SHA256 encryption algorithm
Platform: | Size: 2048 | Author: 陈小小 | Hits:

[CSharpAPress - A Programmers Guide to ADO.NET in C sharp

Description: APress - A Programmers Guide to ADO.NET in C sharp - Source Code 使用c#数据库编程-bill-A Programmers Guide to ADO.NET in C sharp-Source Code to use c# Database Programming
Platform: | Size: 2352128 | Author: 吴志刚 | Hits:

[Other加密标记及基于SHA-1下的安全电子交易

Description: 王小云教授虽然已经破解了sha1,但是sha1并不是由此就垮掉了,而是向着更多元、复杂的方向去发展,本文主要介绍了sha1在电子交易中的使用。-Bruce Schneier sha1 have cracked, but not from this sha1 collapse, but toward more yuan, complicated move in the direction of development, this paper introduces the sha1 in electronic transactions use.
Platform: | Size: 388096 | Author: 刘德小花 | Hits:

[Other《加密与解密》随书光盘(二)工具

Description: 《加密与解密》随书光盘(二)工具 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。-"Encryption and decryption" CD with the book (2) tools in the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology.
Platform: | Size: 14485504 | Author: 张淼 | Hits:

[Other《加密与解密》随书光盘(三)工具

Description: 《加密与解密》随书光盘(三)工具 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。-"Encryption and decryption" CD with the book (3) tools in the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology.
Platform: | Size: 11179008 | Author: 张淼 | Hits:

[Other《加密与解密》随书光盘(四)工具

Description: 《加密与解密》随书光盘(四)工具 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。-"Encryption and decryption" CD with the book (4) tools in the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology.
Platform: | Size: 19382272 | Author: 张淼 | Hits:

[Other《加密与解密》随书光盘(五)习题

Description: 《加密与解密》随书光盘(五)习题 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。-"Encryption and decryption" CD with the book (5) Exercise of the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology.
Platform: | Size: 12234752 | Author: 张淼 | Hits:

[Crack HackSHA-1234567

Description: AES加密算法,最好的加密算法。非常好的。-AES encryption algorithm, the best encryption algorithm. Very good.
Platform: | Size: 189440 | Author: 姜华 | Hits:

[source in ebookXmlSignedCrpyt

Description: 本人目前在做一个关于“数字签名”的项目,在网上查资料,一般都是讲RSA的算法,或者“数字签名”的原理,完全是浪费时间。希望能给以后的做这个的朋友提供个方便。-I do now on a "digital signature" projects in the online information, generally speaking RSA algorithm, or "digital signature" principle, a complete waste of time. Could he do this after a friend to provide convenient.
Platform: | Size: 90112 | Author: junien | Hits:

[Ftp ServerFTPClient

Description: 用C#编写的简单FTP服务器,支持多任务上传下载!-With C# Prepared a simple FTP server, uploading and downloading support for multi-tasking!
Platform: | Size: 95232 | Author: | Hits:

[Delphi VCLDCPcrypt2

Description: DCP各种加密算法集合控件 sha, crc, rc之类的都有-DCP Controls collection of a variety of encryption algorithm sha, crc, rc like all
Platform: | Size: 194560 | Author: 李李 | Hits:

[JSP/JavaencryptModule

Description: Java实现RSA DES SHA算法以完成一个加密组件, Java工程,Eclipse开发,只要直接导入已经存在的工程到工作环境即可。-Java realize RSA DES SHA encryption algorithm in order to complete a component, Java project, Eclipse development, as long as the direct import of already existing projects to the work environment can be.
Platform: | Size: 30720 | Author: wanna001 | Hits:

[GIS programshapelib

Description: 读写ESRI公司Shape格式文件的C底层类库,十分简洁强大,大名鼎鼎的OGR library中对Shape文件的IO就是用的这个库,包含完整代码,文档和测试工程,或用于C/C++,C#,VB等-Read and write ESRI, Shape file format underlying C library, a very concise powerful, the famous OGR library of Shape files IO is to use the library, contains the complete code, documentation and testing projects, or for C/C+ 2B !, C#, VB, etc.
Platform: | Size: 406528 | Author: sun | Hits:
« 1 2 ... 5 6 7 8 9 1011 12 13 14 15 ... 38 »

CodeBus www.codebus.net