Welcome![Sign In][Sign Up]
Location:
Search - SHA-224

Search list

[Crack HackFreeOTFE_2_00_src

Description: 文件驱动加密,功能强大,可产生加密分区,支持AES,MD2,MD4,MD5MD2, MD4, MD5, RIPEMD-128, RIPEMD-160, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512.
Platform: | Size: 3542931 | Author: zengzh15 | Hits:

[Crack HackSHAProj

Description: 以前发的那个只实现了SHA-1, 现在补全了, sha-160, sha-224, sha-256, sha-384, sha-512
Platform: | Size: 70582 | Author: 张鲁夺 | Hits:

[Crypt_Decrypt algrithmssha 加密算法 C实现

Description: 包括 sha1 sha-224,sha-256,sha-384,sha-512 c++测试工具
Platform: | Size: 98060 | Author: zhengrong117 | Hits:

[Crack HackFreeOTFE_2_00_src

Description: 文件驱动加密,功能强大,可产生加密分区,支持AES,MD2,MD4,MD5MD2, MD4, MD5, RIPEMD-128, RIPEMD-160, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512. -Document-driven encryption, powerful, can generate encrypted partition, to support AES, MD2, MD4, MD5MD2, MD4, MD5, RIPEMD-128, RIPEMD-160, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512.
Platform: | Size: 3543040 | Author: zengzh15 | Hits:

[Crack HackSHAProj

Description: 以前发的那个只实现了SHA-1, 现在补全了, sha-160, sha-224, sha-256, sha-384, sha-512-Previously issued only to realize that the SHA-1, is now a complete, sha-160, sha-224, sha-256, sha-384, sha-512
Platform: | Size: 70656 | Author: 张鲁夺 | Hits:

[File OperateFileVerifier

Description: FileVerifier++是一款Windows功能软件,它用于计算文件的hash值(算法包括:CRC32,MD5,SHA-1,SHA-256/224/384/512,WHIRLPOOL,以及RIPEMD-128/160/256/320)。支持的hash文件格式包括MD5SUM .MD5, SFV, BSD CKSUM, 以及其他格式。-FileVerifier++ Software is a Windows feature, it used to calculate the hash value of files (including algorithms: CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, as well as RIPEMD-128/160/256/320). Hash file format support including MD5SUM. MD5, SFV, BSD CKSUM, as well as other formats.
Platform: | Size: 1241088 | Author: bestcode | Hits:

[JSP/Javasha1

Description:  SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-512 (这些有时候也被称做 SHA-2)。 -SHA (Secure Hash Algorithm, Secure Hash Algorithm translated) is a U.S. National Security Agency (NSA) design, the U.S. National Institute of Standards and Technology (NIST) released a series of password hash function. Formally known as the SHA family members of the first release in 1993. But now people take it the informal name of a SHA-0 in order to avoid confusion of its successor. Two years later, SHA-1, the first successor to SHA issued. There are four variants have been released to enhance the output of some minor changes to the scope and design: SHA-224, SHA-256, SHA-384 and SHA-512 (these are sometimes also known as SHA-2).
Platform: | Size: 1024 | Author: 陈诚 | Hits:

[Internet-NetworkSHAProj

Description: 本程序包括一些常用的加密算法,包括:SHA-1,SHA-224,SHA-384,SHA-512等-This process includes some commonly used encryption algorithms, including: SHA-1, SHA-224, SHA-384, SHA-512, etc.
Platform: | Size: 63488 | Author: liu | Hits:

[CA authSHA256

Description: In cryptography, SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. SHA-2 includes a significant number of changes from its predecessor, SHA-1. SHA-2 consists of a set of four hash functions with digests that are 224, 256, 384 or 512 bits.
Platform: | Size: 4096 | Author: monica1987is | Hits:

[Crack HackFileVerifierPP_v0.6.6.6050_src

Description: FileVerifier++是一款Windows功能软件,它用于计算文件的hash值(算法包括:CRC32,MD5,SHA-1,SHA-256/224/384/512,WHIRLPOOL,以及RIPEMD-128/160/256/320)。支持的hash文件格式包括MD5SUM .MD5, SFV, BSD CKSUM, 以及其他格式。-FileVerifier++ is a Windows utility for calculating hashes using a number of algorithms including CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, and RIPEMD-128/160/256/320. Supported hash file formats include MD5SUM .MD5, SFV, BSD CKSUM, and others.
Platform: | Size: 4412416 | Author: 王彦之 | Hits:

[Algorithm12118029sha(1-256-384-512)

Description: SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-512 (这些有时候也被称做 SHA-2)。-SHA (Secure Hash Algorithm, translated as Secure Hash Algorithm) is the design of the U.S. National Security Agency (NSA), the U.S. National Institute of Standards and Technology (NIST) released a series of cryptographic hash function. The official name for a member of the SHA family, was released in 1993. However, people now give it an informal name of SHA-0 to avoid confusion with its successor. Two years later, SHA-1, the first SHA successor release. In addition there are four variants, once released in order to enhance the range of the output and change some subtle design: SHA-224, SHA-256, SHA-384 and SHA-512 (these are sometimes called SHA-2).
Platform: | Size: 26624 | Author: 方东 | Hits:

[Linux-Unixsha224

Description: SHA-224 new NIST standard based off of SHA-256 truncated to 224 bits (Tom St Denis).
Platform: | Size: 1024 | Author: siuqiuqing | Hits:

[CA authSHA

Description: SHA-1 produces a message digest based on principles similar to those used by Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design.SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256) designed by the U.S. National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard (FIPS).
Platform: | Size: 24576 | Author: 李倩 | Hits:

[Linux-Unixsha2-ce-glue

Description: SHA-224 SHA-256 using ARMv8 Crypto Extensions.
Platform: | Size: 2048 | Author: kscangzan | Hits:

[JSP/Javasha256

Description: SHA 252 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the computed hash (the execution of the algorithm) to a known and expected hash value, a person can determine the data s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their one-way nature: given only a computed hash value, it is generally impossible to derive the original data. SHA-2 includes significant changes its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.-SHA 252 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the computed hash (the execution of the algorithm) to a known and expected hash value, a person can determine the data s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their one-way nature: given only a computed hash value, it is generally impossible to derive the original data. SHA-2 includes significant changes its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.
Platform: | Size: 2048 | Author: siva prasad | Hits:

[JSP/Javasha512

Description: sha 512 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the computed hash (the execution of the algorithm) to a known and expected hash value, a person can determine the data s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their one-way nature: given only a computed hash value, it is generally impossible to derive the original data. SHA-2 includes significant changes its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.-sha 512 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the computed hash (the execution of the algorithm) to a known and expected hash value, a person can determine the data s integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their one-way nature: given only a computed hash value, it is generally impossible to derive the original data. SHA-2 includes significant changes its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.
Platform: | Size: 3072 | Author: siva prasad | Hits:

[Linux-Unixsha2-ce-core

Description: sha2-ce-core.S - core SHA-224 SHA-256 transform using v8 Crypto Extensions.
Platform: | Size: 2048 | Author: 蛋糕房 | Hits:

[Linux-Unixsha2-ce-glue

Description: sha2-ce-glue.c - SHA-224 SHA-256 using ARMv8 Crypto Extensions.
Platform: | Size: 1024 | Author: krherqp | Hits:

[CA authBLAKE2-master

Description: BLAKE2 are cryptographic hash functions based on Dan Bernstein s Cha stream cipher, but a permuted copy of the input block, XORed with some round constants, is added before each Cha round. Like SHA-2, there are two variants differing in the word size. ChaCha operates on a 4×4 array of words. BLAKE repeatedly combines an 8-word hash value with 16 message words, truncating the ChaCha result to obtain the next hash value. BLAKE-256 and BLAKE-224 use 32-bit words and those output digest size are 256 bits and 224 bits, while BLAKE-512 and BLAKE-384 use 64-bit words and those output digest size are 512 bits and 384 bits.-BLAKE2 are cryptographic hash functions based on Dan Bernstein s ChaCha stream cipher, but a permuted copy of the input block, XORed with some round constants, is added before each ChaCha round. Like SHA-2, there are two variants differing in the word size. ChaCha operates on a 4×4 array of words. BLAKE repeatedly combines an 8-word hash value with 16 message words, truncating the ChaCha result to obtain the next hash value. BLAKE-256 and BLAKE-224 use 32-bit words and those output digest size are 256 bits and 224 bits, while BLAKE-512 and BLAKE-384 use 64-bit words and those output digest size are 512 bits and 384 bits.
Platform: | Size: 497664 | Author: Jonathan Young | Hits:

CodeBus www.codebus.net