Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - hash function
Search - hash function - List
DL : 0
SHA-1Hash函数源码,可以对任何文件做Hash,得到的Hash值为160位。具有抗强碰撞,弱碰撞等能力。虽然王小云已经找到了个别碰撞。但在新的好的hash函数出来之前仍将被广泛使用。-SHA-1Hash function source, any document can be done right hash, the hash value of 160. Anti-collision, the weak capabilities of the collision. Although Bruce Schneier, had found individual collisions. But the new good hash function will be out before widespread use.
Date : 2025-12-16 Size : 27kb User : 王国维

HMAC即带密钥的HASH函数,用它产生的报文鉴别码(MAC)可以实现报文鉴别。这里我将其做成一个软件,用于对文件的合法性进行校验。以下我先简单介绍软件相关背景知识再介绍其代码实现。 -HMAC key is to bring the hash function, used the text of the report identifying code (MAC) can realize the text identification. I am here to create a software for the document verifying the legitimacy. I briefly introduce software-related background knowledge will introduce its implementation of the code.
Date : 2025-12-16 Size : 49kb User : 杨飞

1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -1) understanding hash functions in network security applications (2) master Hash Function Principle 2 require (1) using any programming language to achieve complete hash of functionality (2) the importation of any eight-byte (64 spaces) data, draw the corresponding eight hash code (Abstract)
Date : 2025-12-16 Size : 1.8mb User :

高亮语法类 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -syntax highlighter category 1) to understand the hash function in network security applications (2) real grasp Hash Function the two principles are, requirements (1) using any programming language to achieve complete hash of functionality (2) the importation of any eight-byte (64-bit ) data, draw the corresponding eight hash code (Abstract)
Date : 2025-12-16 Size : 55kb User :

密码算法中的单向散列函数之SHA算法的C代码-password algorithm for one-way hash algorithm SHA Function of C code
Date : 2025-12-16 Size : 15kb User : WQ

DL : 0
安全散列算法采用单向Hash函数将需加密的明文"摘要"成一串128bit的密文-security hash algorithm uses one-way hash function would require encryption expressly "summary" as a bunch of 128bit The ciphertext
Date : 2025-12-16 Size : 350kb User : fasf

DL : 0
这是一个用matlab写的hash函数,相信对用matlab做实验仿真的同学有所帮助-This is a hash function written in matlab, I believe that using matlab simulation experiments help students
Date : 2025-12-16 Size : 1kb User : 王量

加密解密算法,一种hash函数,128位,linux下的源代码,用C语言编写-Encryption and decryption algorithm, a hash function, 128, linux under the source code, using C language
Date : 2025-12-16 Size : 8kb User : shilin

DL : 0
Snefru is a cryptographic hash function invented by Ralph Merkle which supports 128-bit and 256-bit output.
Date : 2025-12-16 Size : 37kb User : Silver Egg

DL : 0
实现了hash散列函数的功能并有验证结果-Achieved a hash function hash function as well as to verify the results of
Date : 2025-12-16 Size : 79kb User : leslie

安全散列函数的VERILOG实现,通过了fpga验证,在系统正可以直接当IP盒应用-Secure Hash Function VERILOG achieve, through the FPGA verification, the system is can be directly applied when the IP box
Date : 2025-12-16 Size : 68kb User : 金鑫

DL : 0
hash表的使用,使用hash函数并包含解决冲突的方法-the use of hash table, use the hash function and includes a solution to the conflict
Date : 2025-12-16 Size : 2kb User : chenyuehong

DL : 0
目前最新的MD6 Hash 算法源码,下一代的安全散列验证算法。-The new MD6 hash function,the next generation hash function.
Date : 2025-12-16 Size : 34kb User : yuisikyo

Keccak hash加密算法,最新的数据加密方案,适用于软件编码。-Keccak hash function, for software.Newest data hash function.
Date : 2025-12-16 Size : 35kb User : yuisikyo

the hash function FORK-256,256位的安全散列验证算法,SHA-256的替代者。-the hash function FORK-256,256-bit secure hash authentication algorithm, SHA-256 replacement for him.
Date : 2025-12-16 Size : 2kb User : yuisikyo

DL : 0
realization of hash function
Date : 2025-12-16 Size : 2.32mb User : Elena

DL : 0
SHA-256源代码,三个对外的函数:void SHA256Init (SHA256Context *sc) void SHA256Update (SHA256Context *sc, const void *data, uint32_t len) void SHA256Final (SHA256Context *sc, uint8_t hash[SHA256_HASH_SIZE]) 第一个函数初始化,第二个函数输入要hash的字符串,第三个函数输出结果-SHA-256 source code, three external function: void SHA256Init (SHA256Context* sc) void SHA256Update (SHA256Context* sc, const void* data, uint32_t len) void SHA256Final (SHA256Context* sc, uint8_t hash [SHA256_HASH_SIZE]) The first function is initialized, the second hash function, enter the string, the third function of output
Date : 2025-12-16 Size : 5kb User : zoulijun

SHA-2 (Secure Hash Algorithm 2) hash function, written in C language.
Date : 2025-12-16 Size : 64kb User : gKir

DL : 0
数字签名中哈希函数的分析与研究,主要分析哈希函数的结构。-Hash function in the digital signature analysis and research, the main structure of the hash function.
Date : 2025-12-16 Size : 92kb User : 马利

DL : 0
亲测,很好用的hash function-Pro-test, a good hash function used
Date : 2025-12-16 Size : 1kb User : KKy
« 12 3 4 5 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.