搜索资源列表
VBCrypto2.zip
- 使用VB写的加密算法库,包括Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms
基于SHA-256的HMAC文件校验器
- HMAC即带密钥的HASH函数,用它产生的报文鉴别码(MAC)可以实现报文鉴别。这里我将其做成一个软件,用于对文件的合法性进行校验。以下我先简单介绍软件相关背景知识再介绍其代码实现。 -HMAC key is to bring the hash function, used the text of the report identifying code (MAC) can realize the text identificati
sha256_encrypt
- SHA 256 加密算法,比 MD5 更好的算法更好的算法,希望对大家有帮助-SHA 256 encryption algorithm, better than the MD5 algorithm better algorithm, we hope to help
sha(1,256,384,512)
- 一个sha 哈希密码支撑算法系列的程序 包括了sha1,sha256,sha384和sha512算法-a password support Hash Algorithm series of procedures including sha1, SHA256, SHA384 and SHA512 Algorithm
jssha2-0.3
- javascr ipt实现的SHA-256-384-512 hash算法
FreeOTFE_2_00_src
- 文件驱动加密,功能强大,可产生加密分区,支持AES,MD2,MD4,MD5MD2, MD4, MD5, RIPEMD-128, RIPEMD-160, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512.
SHA
- A code for Secure Hashing
sha1
- SHA 1算法软件,代码很全,能运行,界面不错-SHA 1 algorithm software, the code is full, can run
sha1
- sha-1消息摘要算法c++代码,用于数字签名时将消息加密成固定长的密文。-sha-1 message digest algorithm c++ code, when used for digital signatures into fixed-length messages encrypted ciphertext.
SHA256
- In cryptography, SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processi
sha256-in-FPGA
- 加密芯片选择开发2 -- SHA-256 理解.pdf-Encryption chip select development of 2- SHA-256 to understand. Pdf
HASH-code-implementation-using-VHDL
- implementation for Secure Hash Algorithm 1 SHA-1 in vhdl language contain no test file.
SHA
- 3种安全HASH算法的实现(SHA-1,SHA-256,SHA-512),并对3中算法的性能进行了测试-Achieve 3 kinds of SHA algorithm (SHA-1, SHA-256, SHA-512) and test the performance of them
12118029sha(1-256-384-512)
- SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-2
SHA-256SecuretyAnalysis
- 研究ras-256hash函数的结构安全性,给出三个sha-256变种函数,分别分析他们抵抗chabaud-joux攻击的能力与sha-256结构果比较,版权归作者所有,仅供研究。-Structural safety research the ras-256hash function, given three sha-256 variant function analysis their attacks against chabaud-
SHA-256
- sha is an algorithm for security purposes
intel-sha-extensions_1
- Intel SHA-1和SHA-256汇编代码实现,非常高效。需要使用Intel 自己的ICC编译器编译。VC2010尚不支持。-Intel SHA-1 and SHA-256 Assemble code. High Performance. Must use Intel ICC compiler to compile then
SHA
- SHA-1 produces a message digest based on principles similar to those used by Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design.SHA-2 is a set of crypto
sha-256
- sha加密解密 通过测试,希望对大家有帮助(Sha encryption and decryption through the test, we want to help)
aes-rsa-md5-des-sha
- aes rsa md1245 des sha128,244,256(aes rsa md1245 des sha)