Welcome![Sign In][Sign Up]
Location:
Search - md5 hash

Search list

[Crack Hackrehash_src

Description: 计算文件hash值的源代码,包含crc,md2,md4,md5,sha,sha1,sha256,ra-Calculated hash value of document
Platform: | Size: 281600 | Author: 风成 | Hits:

[Compress-Decompress algrithmssha1sourcecode

Description: 本代码是SHA1用C语言实现的源代码,SHA1与MD5是目前最为常用的HASH算法,可用于认证及签名等-This code is SHA1 with C language source code, SHA1 and MD5 is currently the most commonly used HASH algorithm, can be used for authentication and signatures
Platform: | Size: 53248 | Author: cl | Hits:

[OS programchash_demo

Description: hash, md5, sha1 algrithm
Platform: | Size: 71680 | Author: apollo | Hits:

[Crack HackSHA_MatLab

Description: SHA (安全Hash算法)是一种单向散列算法,可用于数字加密或数字签名,是比MD5更加安全的单向散列算法,与MD5算法一起时被应用最广泛的两种算法。-SHA (secure Hash algorithm) is a one-way hash algorithm, can be used for digital encryption or digital signature is more secure than the MD5 one-way hash algorithm, in conjunction with the MD5 algorithm was the most widely used two algorithms.
Platform: | Size: 5120 | Author: 张汉江 | Hits:

[Crack Hacktest

Description: SHA-1(Secure Hash Algorithm)是美国国家标准局(National Institute of Standard and Technology NIST)为了配合数位签章演算法(Digital Signature Algorithm DSA)的使用所发布的联邦资讯处理标准-FIPS PUB 180-1(Federal Information Processing Standard Publication 180-1),而SHA-1 则是SHA-1 (FIPS180)的改良版,现今与MD5 皆广被使用拿来做密码验证功能.其设计的方法是根据MD4,来对输入的资料讯息(Message)产生出一个160 位元的讯息摘要(Digest) ,对於资料安全性提供了有效的保障.-SHA-1 (Secure Hash Algorithm) is a United States National Bureau of Standards (National Institute of Standard and Technology NIST) in order to tie in with the digital signature algorithm (Digital Signature Algorithm DSA) issued by the use of Federal Information Processing Standard-FIPS PUB 180-1 (Federal Information Processing Standard Publication 180-1), and SHA-1 is SHA-1 (FIPS180) improved version of the current and MD5 are widely used to make the use of password authentication function. its design method is based on MD4, to the input data message (Message) produced a 160-bit message digest (Digest), for data security to provide effective protection.
Platform: | Size: 1024 | Author: zyt | Hits:

[File OperateFileVerifier

Description: FileVerifier++是一款Windows功能软件,它用于计算文件的hash值(算法包括:CRC32,MD5,SHA-1,SHA-256/224/384/512,WHIRLPOOL,以及RIPEMD-128/160/256/320)。支持的hash文件格式包括MD5SUM .MD5, SFV, BSD CKSUM, 以及其他格式。-FileVerifier++ Software is a Windows feature, it used to calculate the hash value of files (including algorithms: CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, as well as RIPEMD-128/160/256/320). Hash file format support including MD5SUM. MD5, SFV, BSD CKSUM, as well as other formats.
Platform: | Size: 1241088 | Author: bestcode | Hits:

[Crack Hackcrypto_api_hashes

Description: Delphi Cryptographic API Hash example using MD2 MD4 MD5 SHA1 GOST-Delphi Cryptographic API Hash example using MD2 MD4 MD5 SHA1 GOST
Platform: | Size: 43008 | Author: LamiaD69 | Hits:

[Crack Hack7-2-1

Description: Message Digest Algorithm-取得MD5雜湊值長度-Message Digest Algorithm-made MD5 hash value of length
Platform: | Size: 10240 | Author: Reg | Hits:

[Crack Hacktest_md5

Description: 计算任意字符串MD5散列值的程序,已经经过验证可用。-Calculation of arbitrary string MD5 hash value of the procedure, has been available to verify.
Platform: | Size: 17408 | Author: zz | Hits:

[Crack Hackmd5

Description: md5加密,产生哈希散列值!程序简单易读,大部分学过c的人保证都能读懂!-md5 encryption, hash value generated hash! Procedures for easy accessibility, most of the study have been c to ensure that people can read!
Platform: | Size: 189440 | Author: wanglianqing | Hits:

[Othermd5hash1

Description: This is a sample code for md5 hash implementation in VC-This is a sample code for md5 hash implementation in VC++
Platform: | Size: 51200 | Author: jch | Hits:

[Crack HackMD5

Description: 本程序实验MD5算法,即计算哈希值分组长度为128bit-MD5 algorithm for the experimental procedure, that is, calculating the hash value
Platform: | Size: 258048 | Author: lishen | Hits:

[Crack HackMD5

Description: 哈希算法--MD5的简单C++实现-Hash Algorithm- MD5 simple C++ to achieve,
Platform: | Size: 5120 | Author: 张力鹏 | Hits:

[Windows DevelopMD5Digest_2008-09-27

Description: Generate MD5 hash string
Platform: | Size: 50176 | Author: Tim | Hits:

[Delphi VCLDelphi_Md5

Description: Delphi源码之:Md5算法+判断网页是否更新过 通过hash验证Md5算法 判断指定网页是否更新过,比如你要下载网页,昨天已经下载过的,今天不想再次下载,可以参考本程序的判断方法-Delphi source code is: Md5 algorithm+ to determine whether the updated web page through the Md5 authentication hash algorithm to determine whether the updated designated page, for example, you want to download page, downloaded yesterday, and today do not want to download, you can reference to determine the method of this procedure
Platform: | Size: 272384 | Author: mayongtao520 | Hits:

[Crack Hackmd5

Description: MD5 calculator : compute hash
Platform: | Size: 121856 | Author: amir | Hits:

[OS programhash

Description: 求所有主流Hash值的程序,包括MD5,sha等-Hash value for all major procedures, including MD5, sha, etc.
Platform: | Size: 9042944 | Author: tz1985 | Hits:

[JSP/Javajava-md5

Description: MD5代码,主要实现哈希值加密及验证,一个小的源代码,但是在简单程序中可以用到。-MD5 code, the main hash value encryption and authentication, a small source code, but can be used for simple procedures.
Platform: | Size: 1024 | Author: xiaojing | Hits:

[Crack HackHASH_MD5

Description: HASH算法MD5的代码实验,编译可以直接使用的MD5源代码-HASH algorithm MD5 code experiment can be directly used to compile the source code for MD5
Platform: | Size: 64512 | Author: xiaolin | Hits:

[Crack Hackadaptendian-md5

Description: 计算机芯片不同其大小印第安序不同,一般分为大印第安序和小印第安序,如果不能自动区别,用于签名验证的hash函数结果不一样,不能验证-Indian computer chip the size of the different sequence of different, generally divided into large and small Indian Indian sequence order, if the distinction does not automatically used for signature verification of the hash function is not the same as the results can not be verified
Platform: | Size: 4096 | Author: yhl | Hits:
« 1 2 3 4 5 67 8 9 10 11 ... 15 »

CodeBus www.codebus.net