搜索资源列表
SHAMD
- SHA-256 散列哈希函数 用于数据加密-SHA-256 hash function
sha_core
- SHA-1 SHA-256散列算法IP CORE,非常实用-SHA-1 SHA-256 hash algorithm IP CORE, very useful
SHA_256
- 用java代码来实现SHA-256的加密算法-SHA-256 encryption algorithm java code
sha256
- SHA-256 hash implementation and interface functions.
sha224
- SHA-224 new NIST standard based off of SHA-256 truncated to 224 bits (Tom St Denis).
sha1_unittest
- SHA 256 Hash String Source Code for Linux.
SHA256Digest
- FIPS 180-2 implementation of SHA-256.
sha-256
- sha256的签名算法,纯C实现,已验证正确,在控制台上直接运行即可,-sha256 signature algorithm, pure C implementation ,has been verified properly and can be run directly on the console.
hash
- 散列算法,用于生成原始消息的数字指纹,本算发基于MATLAB编写,本算法包含多种流行的散列算法,包括SHA1和SHA-256等广泛应用的散列算法,通过本程序,可以对几种广泛应用的散列算法进行调用-Hash algorithm used to generate the digital fingerprint of the original message, this is based on MATLAB, this algorithm c
test_kdf256
- LTE密钥派生算法,HMAC-SHA-256-key derivation functon for LTE
SHA256
- SHA-256加密算法,可计算出字符串或文件的HASH值,带测试程序。-SHA-256 encryption algorithm to calculate the value HASH string or file with the test procedures.
SEAL-WIL.ZIP
- berikut ini adalah sebuah program c untuk sha-256
High-Throughput-Hardware_Software-Co-Design-Appro
- High Throughput Hardware_Software Co-Design Approach for SHA-256 Hashing Cryptographic Module In IPSec_IPv6
sha256-586
- SHA 256 block transform for x86 Linux.
SHA256Digest
- FIPS 180-2 implementation of SHA-256.
nx-sha256
- SHA-256 routines supporting the Power 7+ Nest Accelerators driver.
SHA204_90USB1287
- ATSHA204 主要特性: 1,SHA-256 Hash算法 2,有保证的唯一的72-bit序列号; DS28CN01 64-bit 不仅有软件加密,内部还有高质量硬件加密。 3,16个槽口的4kbits EEPROM: 4Kbits / 8 = 512Bytes 每个槽口32bytes 4,I2C接口, 单线接口 5, 和Atmel AT88SA102S,AT88SA10HS 6, i2c 地
sha2-ce-glue
- SHA-224 SHA-256 using ARMv8 Crypto Extensions.
sha256
- SHA 252 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digit
sha512
- sha 512 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digit