搜索资源列表
sha2-1.0
- SHA-2 的代码实现-SHA-2 source implementation
shs2
- SECURE HASH STANDARD (SHS)使用160-bit SHA 散列算法,主要用于数字签名 DSA-SECURE HASH STANDARD (SHS) using 160-bit SHA hash algorithm, mainly used for digital signature DSA
Crypto
- ASM 多种hash模块,汇编源码 MD2,4,5 SHA 等多种加密算法 还有其他赠送内容-ASM multiple hash module, the compilation of source MD2, 4,5 SHA encryption algorithm, etc. There are other free content
sha
- 主流hash函数--sha的源代码,可用于数据签名,是目前应用最广的算法之一-Sha mainstream hash function source code, can be used for data signatures, is the application of the algorithm, one of the most widely
sha1
- SHA-1 algorithm implemented in C.
sha
- 使用标准C++开发的SHA-1算法的实现-Using standard C++ Developed SHA-1 algorithm
sha
- 支持SHA算法,对文件或者字符串进行散列计算,直接可以应用在程序中,形成文件摘要。-To support the SHA algorithm, on paper or string hash calculation can be applied directly in the proceedings, the formation of a document containing a summary.
sha-1
- sha-1加密源码 sha-1加密源码-sha-1 encryption source code sha-1 encryption sha-1 encryption source
use_3_shoft
- SHA-1的verilog程序,经过优化的了,希望可以对大家有帮助-SHA-1 of the verilog program, optimized, and hope that we can help you
sha
- C实现的SHA-1,SHA-256,SHA-512算法-。
Sha
- This is SHA-1 allgorithmwhich may be used to generate message digests. This is written in C language and runs in Linux environment.
sha2-1.0
- SHA-2 (Secure Hash Algorithm 2) hash function, written in C language.
sha1
- SHA-1算法的C语言实现,求字符串的HASH-SHA-1 algorithm in C language implementation, find the string HASH
SHA-1
- SHA-1算法使用C语言实现,包含1个C程序和一个测试程序,经过测试,可以运行。-SHA-1 algorithm using C language, contains a C program and a test program, after testing, you can run.
sha
- SHA加解密算法,SHA是安全散列算法,c语言实现的Benchmark-SHA encryption and decryption algorithm
sha-1
- 把读入的数据按SHA-1算法要求,进行分组并完成最后一个分组的填充,在c环境下完成,需自行创建读入数据文档。-To read the data required by SHA-1 algorithm, grouping and complete fill the last group, completed under the c, to be read into the data files to create their own.
SHA-1
- SHA1散列算法,在AVR上实现SHA-1算法应用于DS1961卡的读写操作-SHA1 hash algorithm on the AVR to achieve DS1961 SHA-1 algorithm is applied to the card read and write operations
sha-1
- The document is about Secure Hash Agorithm (SHA-1)
sha-1
- A source code for SHA-1 encryption!
SHA-1-Kel4
- SHA-1 Program. SHA-1 is used for make the message to a fixed length, therefore the content within the message cannot be tampered