搜索资源列表
sha1
- SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-51
WinMan
- This source code contains some codes from this site and others... this code has been written in short time... so there are too many problems in it that I didn t for example CMD form is not good as it must be! also supports: some of encodings like MD5
SHAProj
- 本程序包括一些常用的加密算法,包括:SHA-1,SHA-224,SHA-384,SHA-512等-This process includes some commonly used encryption algorithms, including: SHA-1, SHA-224, SHA-384, SHA-512, etc.
cwcli_src
- CipherWall Client, code to work with sockets, sqlite database and CA realization: - RSA 2048-4096 bit - digit auth on RSA - 3-step cert auth - Blowfish in CFB mode (448 bit) - SHA-256 и SHA-512 - HMAC on base SHA-256 - random-digit gen
safecli_src
- CipherWall Client, code to work with sockets, sqlite database and CA realization: - RSA 2048-4096 bit - digit auth on RSA - 3-step cert auth - Blowfish in CFB mode (448 bit) - SHA-256 и SHA-512 - HMAC on base SHA-256 - random-digit gen
crisscross-latest.tar.tar
- CrissCross是一种小型的跨平台C + +库,用于处理控制台和文件I / O , CPU的识别( CPUID ) ,散列( MD2 , MD4 , MD5编码,了SHA - 1 ,SHA- 256 ,SHA- 512 ,Tiger) ,Socket( TCP和目前唯一的UDP )和数据结构( LList , DArray , RedBlackTree , AVLTree , SplayTree等) 。其目的是运行在Windows , Linux , FreeBSD的, OpenBSD系统,
SHA512
- Implement SHA 512 algorithm using visual studio 2010. Very good to learn.
several-hash-functions-in-php
- php中几种哈希函数的对比,包含MD4、MD5、SHA-1、SHA-256、SHA-384以及SHA-512-php several hash functions in contrast, contains of MD4, MD5, SHA-1, SHA-256, SHA-384 and SHA-512
sha-512.c
- visual c++实现的SHA512算法,已仿真和验证-visual c++ implementation of SHA512 algorithm, simulation and verification has been done.
LongDigest
- Base class SHA-384 and SHA-512 for Andriod.
sha-512
- 传统的加密算法,不过现在基本不用了,但可以用来学习加解密-Traditional encryption algorithm, but now the basic need, but can be used to encrypt and decrypt learning
Optimum-Architecture-of-SHA-256-(384-512)-for-Har
- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations
sha512
- SHA 512 algorthm using c++language
LongDigest
- Base class for SHA-384 and SHA-512.
nx-sha512
- SHA-512 routines supporting the Power 7+ Nest Accelerators driver.
sha512-avx-asm
- Implement fast SHA-512 with AVX instructions. (x86_64).
sha512-ssse3-asm
- Implement fast SHA-512 with SSSE3 instructions. (x86_64).
sha256
- SHA 252 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the compu
sha512
- sha 512 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the compu
sha512_generic
- SHA-512 code by Jean-Luc Cooke for Linux v2.13.6.