搜索资源列表
300EncryptAndDecrypt_source
- md2、MD5、DES、RSA、SHA-1等加解密方法函数-Function for MD5、DES、RSA etc.
several-hash-functions-in-php
- php中几种哈希函数的对比,包含MD4、MD5、SHA-1、SHA-256、SHA-384以及SHA-512-php several hash functions in contrast, contains of MD4, MD5, SHA-1, SHA-256, SHA-384 and SHA-512
sha1
- keil 和 VC的sha1 算法的实现-keil and VC sha1 algorithm implementation
Encryption
- 用java实现国际知名的sha-1加密算法,调用方法会得到一个经过加密的20位符号字符串-sha-1 encryption method
DSSHA1
- SHA-1 1-wire algorithm
sha_1
- sha-1算法实现的加密的代码。是目前使用最广泛的散列算法,在数字签名标准中被使用-sha-1 algorithm, the encryption code. Is currently the most widely used hash algorithm to be used in the Digital Signature Standard
sha_core
- SHA-1 SHA-256散列算法IP CORE,非常实用-SHA-1 SHA-256 hash algorithm IP CORE, very useful
HMAC
- 任何的mac算法都可以使用标准的hash功能,比如MD5或者sha-1,这种情况下,强度取决于hash功能,和最后的结果的比特串。密匙是关键。-HMAC is a message authentication code (MAC) and can be used to verify the integrity and authentication of a message. It involves hashing a message with a secret key. As with any
tarena_dang
- Struts 2.0技术综合应用,包括上传图片功能,明文加密算法SHA-1和MD5,上传用户头像,根据action随机生成验证码,用链接实现数据的分页处理,以及拦截器和Logger日志框架的引入,总之相当强大,学习Struts 2.0,把这个项目搞清楚了基本上就可以啦-Struts 2.0 technology applications, including upload pictures to plaintext encryption algorithm SHA-1 and MD5, and
sha1
- Use to do SHA1 encode,SHA-1 produces a 160-bit message digest based on principles similar to those used by Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design.-Use to do SHA1 encode,
mrshs
- sha 1 implementation
SHA_1_V
- 基于FIPS 180-4标准的SHA-1算法的verilog HDL实现-FIPS 180-4 standard SHA-1 algorithm-based verilog HDL implementation
sha1_v01
- 基于FIPS 180-4标准的SHA-1算法的verilog HDL实现,分模块分别实现-FIPS 180-4 standard SHA-1 algorithm-based verilog HDL sub-modules, respectively, to achieve
SHAL_KEIL
- 通过单片机实现哈希函数SHA-1,C源程序完全可用,已经测试,外部加密芯片采用DS28E01-1-MCU hash function SHA-1, C source code fully available, and has been tested external encryption chip uses DS28E01-100
HardwareStructure-SHA-1
- J安全散列算法是数字签名等密码学应用中重要的 工具!目前最常用的安全散列算法是"#$ &算法’它被广泛 地应用于电子商务等信息安全领域!为了满足应用对安全散 列算法计算速度的需要’该文提出了一种快速计算"#$ & 算法的硬件结构!该方法通过改变硬件结构(引入中间变量’ 达到缩短关键路径的目的’进而提高计算速度!这种硬件结 构在)*&+,-工艺下的$"./实现可以达到0*12345的数 据吞吐量’是改进前的两倍以上6它在782$上实现的性能 也接近目前"#$ &算法
SHA-1
- Secured Hash Algorithm
sha_1
- 计算sha-1,然后再进行base64转码-Calculate sha-1, and then base64 transcoding
SHA-1
- 安全散列算法SHA1,主要用于数字签名。输入数据的最大长度为2^64,输出为160位的散列函数值-Secure Hash Algorithm SHA1, and mainly used for a digital signature. The maximum length of the input data is 2 ^ 64, the output of 160-bit hash function value
SHA_256
- hash加密SHA-1,适用于一次性口令-hash encryption SHA-1, applies to the one-time password
digest
- MD5,SHA-1信息摘要查看工具,信息安全实验的,平台vc++6.0-MD5, SHA-1 Information Summary View tool, information security experiment platform vc++6.0