搜索资源列表
cryptix_src_3-1-2.zip
- 另一个使用java编写的加密通用算法包,含des,rsa,sha,md5,md4,md2,idea,blowfish等很多加密算法和密钥存储、签名等源码
VBCrypto2.zip
- 使用VB写的加密算法库,包括Blowfish, IDEA, Triple DES (3DES), DES, DESE, Gost, Skipjack, TEA, Cast5, Serpent-128, Serpent-192, Serpent-256, Rijndael-128, Rijndael-192, Rijndael-256, RC2, RC4, and Twofish), six popular hash algorithms (SHA-1, SHA-256, MD2, MD4, MD
sha1
- SHA-1加密算法-SHA-1 encryption algorithm
加密标记及基于SHA-1下的安全电子交易
- 王小云教授虽然已经破解了sha1,但是sha1并不是由此就垮掉了,而是向着更多元、复杂的方向去发展,本文主要介绍了sha1在电子交易中的使用。-Bruce Schneier sha1 have cracked, but not from this sha1 collapse, but toward more yuan, complicated move in the direction of development, this paper introduces the sha1 in elect
SHA-1test
- SHA-1 JAVA实现用于CHORD或者加密文件-failed to translate
SHA
- 3种安全HASH算法的实现(SHA-1,SHA-256,SHA-512),并对3中算法的性能进行了测试-Achieve 3 kinds of SHA algorithm (SHA-1, SHA-256, SHA-512) and test the performance of them
polarssl-1.1.1
- 加解密算法.支持AES, DES, SHA-1, RSA, DSA, Diffie-Hellman 等多种算法.-AES, DES, SHA-1, RSA, DSA, Diffie-Hellman
SHA
- SHA-1 string encryption/decrytion C-SHA-1 string encryption/decrytion C++
12118029sha(1-256-384-512)
- SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-512
SHA-1_prj
- SHA-1算法C源码,VC建的工程。加密字符串,数组。-SHA-1 C source code
haxihanshu-SHA-1suanfa
- 哈希函数SHA-1的c实现,能正常运行。很实用,适合用来学习sha-1,希望对你有帮助。-A hash function is SHA-1 (c) achieve normal operation. Very practical, ideal for learning the sha-1, you want to help.
dbus-sha
- SHA-1 implementation for Linux Device.
sha
- In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm".
sha
- SHA-1 算法程序 64个字符分开,同时避免0字符对字符串接口的影响。-SHA-1 algorithm 64 characters apart, while avoiding the 0 character of the string interface effects.
intel-sha-extensions_1
- Intel SHA-1和SHA-256汇编代码实现,非常高效。需要使用Intel 自己的ICC编译器编译。VC2010尚不支持。-Intel SHA-1 and SHA-256 Assemble code. High Performance. Must use Intel ICC compiler to compile then
SHA
- SHA-1 DLL source files.
SHA
- SHA-1 produces a message digest based on principles similar to those used by Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design.SHA-2 is a set of cryptographic hash functions (SHA-22
SHA-1_by_Y
- SHA-1基本原理及C语言实现方法,适合初学者使用-SHA-1 basic principle and C language realization method
SHA
- 安全哈希算法(SHA-1) 具有169bite消息摘要的迭代hash函数,学生原创 《密码学原理与实践》安全hash算法 sha-1 实现 -The Secure Hash Algorithm (SHA-1) has an iterative hash function with a 169bite message digest. The student s original cryptography principle and practice safe hash algorithm sh
sha1
- SHA1Init(Context); SHA1Update(Context,@s[1],length(s)); SHA1Final(Context,Digest);(A binary compatible SHA1 implementation written by Dave Barton (davebarton@bigfoot.com) 160bit hash size)