Welcome![Sign In][Sign Up]
Location:
Search - sha-1

Search list

[Crack Hacksha-1

Description: SHA-1Hash函数源码,可以对任何文件做Hash,得到的Hash值为160位。具有抗强碰撞,弱碰撞等能力。虽然王小云已经找到了个别碰撞。但在新的好的hash函数出来之前仍将被广泛使用。-SHA-1Hash function source, any document can be done right hash, the hash value of 160. Anti-collision, the weak capabilities of the collision. Although Bruce Schneier, had found individual collisions. But the new good hash function will be out before widespread use.
Platform: | Size: 28059 | Author: 王国维 | Hits:

[File OperateSHA

Description: SHA加密算法是目前广为应用的重要加密方法之一。而SHA-1 生成 160 位的消息摘要,虽然执行更慢,却被认为更安全。明文消息的最大长度可达到 264 位。下面是网络上流传的SHA算法,我们自己调试了一下,已经通过。现把主函数和算法函数贴出来。
Platform: | Size: 1598 | Author: jinyin | Hits:

[WEB Codesha-1

Description: 我自己用javascript实现的sha-1散列函数,对要在web客户端要进行单向加密的情况应该很有帮助
Platform: | Size: 2108 | Author: 罗小江 | Hits:

[Crack HackSHA-1的密码检验示例

Description: sha密码检验的示例 希望对大家有 帮助-sha password test examples we hope to help
Platform: | Size: 18395 | Author: ZR | Hits:

[Crack HackVBCrypto2

Description: 使用VB写的加密算法库,包括Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms (SHA-1, SHA-256, MD2, MD4, MD5, and RipeMD), 还有 Huffman和Base64算法.- Uses encryption algorithm storehouse which VB writes, including Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms (SHA-1, SHA-256, MD2, MD4, MD5, and RipeMD), but also has Huffman and the Base64 algorithm
Platform: | Size: 635904 | Author: none | Hits:

[Documentsdes

Description: 技术说明,还有RSA算法、HASH算法、MD5、sha1RSA等的C源码.-technical note, RSA algorithm, hash algorithm, MD5, sha1RSA the C source.
Platform: | Size: 91136 | Author: 彭明 | Hits:

[Crack Hack2006022012065523240

Description: SHA-1用.net解密的文件。。。。或者用C++/VC-SHA-1 use. Net declassified document. . . . Or C/VC
Platform: | Size: 59392 | Author: 陈亭 | Hits:

[Windows DevelopSHA1Gen1

Description: SHA1加密算法的vc++实现 SHA1加密算法的vc++实现-SHA1 encryption algorithm vc achieve SHA1 encryption algorithm v c SHA1 encryption algorithm to achieve the vc achieve SHA1 encryption algorithm to achieve the vc
Platform: | Size: 32768 | Author: 小白 | Hits:

[Crack Hacksha256_encrypt

Description: SHA 256 加密算法,比 MD5 更好的算法更好的算法,希望对大家有帮助-SHA 256 encryption algorithm, better than the MD5 algorithm better algorithm, we hope to help
Platform: | Size: 2048 | Author: 艾伦 | Hits:

[OS Developeventshare

Description: Sample code that demostrates how to use shared events in Kernel mode.-Sample code that demostrates how to use sha red events in Kernel mode.
Platform: | Size: 9216 | Author: first | Hits:

[Documentssha-1article

Description: 沙-1的学术论文,英文原版,如果相对哈希罕书有更深层次的造诣就要仔细研究这篇文章了--1 sand of academic and English original. If the relative Haxihan book at a deeper level of attainment should study carefully the article
Platform: | Size: 198656 | Author: 岳云召 | Hits:

[Crack Hacksha-1code

Description: 沙-1的经典源代码,去除无用的语句,把代码效率提高到极限。-sand-1 classical source code, remove unwanted statement, code efficiency to the limit.
Platform: | Size: 10240 | Author: 岳云召 | Hits:

[Crack HackEncypt

Description: 包含MD5,SHA-1,DES,RSA的程序代码-includes MD5, SHA-1, DES, RSA code
Platform: | Size: 15360 | Author: name | Hits:

[Otherhashtool

Description: 一款将十六进制串进行摘要(包括md5和sha-1),非常好用。-A string of hexadecimal for summary (including md5 and sha-1), very handy.
Platform: | Size: 8192 | Author: 李德兵 | Hits:

[Crack HackSHA_MatLab

Description: SHA (安全Hash算法)是一种单向散列算法,可用于数字加密或数字签名,是比MD5更加安全的单向散列算法,与MD5算法一起时被应用最广泛的两种算法。-SHA (secure Hash algorithm) is a one-way hash algorithm, can be used for digital encryption or digital signature is more secure than the MD5 one-way hash algorithm, in conjunction with the MD5 algorithm was the most widely used two algorithms.
Platform: | Size: 5120 | Author: 张汉江 | Hits:

[OS programsha

Description: SHA-1 算法程序 64个字符分开,同时避免0字符对字符串接口的影响。-SHA-1 algorithm 64 characters apart, while avoiding the 0 character of the string interface effects.
Platform: | Size: 1055744 | Author: mumu | Hits:

[Internet-NetworkSHA

Description: sha c 语言源码rs a c 语言源码rsa c 语言源码-sha c 语言源码rsa c 语言源码
Platform: | Size: 26624 | Author: 林峰 | Hits:

[Crack HackSHA

Description: 安全哈希算法(SHA-1) 具有169bite消息摘要的迭代hash函数,学生原创 《密码学原理与实践》安全hash算法 sha-1 实现 -The Secure Hash Algorithm (SHA-1) has an iterative hash function with a 169bite message digest. The student s original cryptography principle and practice safe hash algorithm sha-1 implementation
Platform: | Size: 4570112 | Author: 周韬略 | Hits:

[Crypt_Decrypt algrithmssha-3 C语言源码

Description: sha-3哈希杂凑算法,基于c语言编程的源码
Platform: | Size: 33033 | Author: wby23225 | Hits:

[Crack HackMD5Encrypt

Description: MD5算法具有以下特点: 1、压缩性:任意长度的数据,算出的MD5值长度都是固定的。 2、容易计算:从原数据计算出MD5值很容易。 3、抗修改性:对原数据进行任何改动,哪怕只修改1个字节,所得到的MD5值都有很大区别。 4、强抗碰撞:已知原数据和其MD5值,想找到一个具有相同MD5值的数据(即伪造数据)是非常困难的。 MD5的作用是让大容量信息在用数字签名软件签署私人密钥前被"压缩"成一种保密的格式(就是把一个任意长度的字节串变换成一定长的十六进制数字串)。除了MD5以外,其中比较有名的还有sha-1、RIPEMD以及Haval等。(The MD5 algorithm has the following characteristics: 1: compression of arbitrary length data, calculate the MD5 value of the length is fixed. 2, easy to calculate: from raw data to calculate the value of MD5 is very easy. 3, anti modification: any modifications to the original data, even if only to modify 1 bytes, the MD5 values are very different. 4, strong anti collision: known as original data and its MD5 value, want to find someone with the same MD5 value of the data (i.e. data falsification) is very difficult. The role of MD5 is to make the large capacity information in the private key is signed with a digital signature software are compressed into a confidential format (is an arbitrary length byte string transform into a long string of sixteen hexadecimal numbers). In addition to MD5, one of the more famous are SHA-1, RIPEMD and Haval.)
Platform: | Size: 21504 | Author: Sky_Vico | Hits:
« 1 2 3 4 56 7 8 9 10 ... 38 »

CodeBus www.codebus.net