搜索资源列表
sha
- sha-1的加密算法,可以进而通过它编出sha-1的为随机数生成器-sha-1 encryption algorithm, through which you can then compile the sha-1 for the random number generator
sha1
- In cryptography, SHA-1 is a cryptographic hash function designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm.
SHA256
- In cryptography, SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Se
sha-1
- SHA JAVA算法,里面有两个函数,只需调用其中一个就可以了-SHA JAVA
29734318sha-1
- sha-1算法 信息安全密码学中的一个重要的算法,用于加解密运算-sha-1 Algorithm information security
SHA-1test
- SHA-1 JAVA实现用于CHORD或者加密文件-failed to translate
SHA
- 3种安全HASH算法的实现(SHA-1,SHA-256,SHA-512),并对3中算法的性能进行了测试-Achieve 3 kinds of SHA algorithm (SHA-1, SHA-256, SHA-512) and test the performance of them
polarssl-1.1.1
- 加解密算法.支持AES, DES, SHA-1, RSA, DSA, Diffie-Hellman 等多种算法.-AES, DES, SHA-1, RSA, DSA, Diffie-Hellman
SHA
- SHA-1 string encryption/decrytion C-SHA-1 string encryption/decrytion C++
12118029sha(1-256-384-512)
- SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-512
SHA-1ImplementationOnFPGA
- 希算法SHA-1算法广泛地应用于电子商务、商用加密软件等信息安全领域。通过对SHA.1算法的深入 分析,提出了流水线结构的硬件实现方案。通过缩短关键路径,使用片内RAM代替LE寄存器实现流水线中间变量 的数据传递,有效地提高了工作频率和单位SHA-1算法的计算速度。这种硬件结构在Altera系列芯片上的实现性能 是Ahera商用SHA-1算法IP核的3倍以上。-Hash algorithm SHA-1 is used widely in cryptographic applicati
SHA-1_prj
- SHA-1算法C源码,VC建的工程。加密字符串,数组。-SHA-1 C source code
haxihanshu-SHA-1suanfa
- 哈希函数SHA-1的c实现,能正常运行。很实用,适合用来学习sha-1,希望对你有帮助。-A hash function is SHA-1 (c) achieve normal operation. Very practical, ideal for learning the sha-1, you want to help.
dbus-sha
- SHA-1 implementation for Linux Device.
sha
- In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm".
sha
- SHA-1 算法程序 64个字符分开,同时避免0字符对字符串接口的影响。-SHA-1 algorithm 64 characters apart, while avoiding the 0 character of the string interface effects.
intel-sha-extensions_1
- Intel SHA-1和SHA-256汇编代码实现,非常高效。需要使用Intel 自己的ICC编译器编译。VC2010尚不支持。-Intel SHA-1 and SHA-256 Assemble code. High Performance. Must use Intel ICC compiler to compile then
SHA
- SHA-1 DLL source files.
SHA
- SHA-1 produces a message digest based on principles similar to those used by Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design.SHA-2 is a set of cryptographic hash functions (SHA-22
SHA-1_by_Y
- SHA-1基本原理及C语言实现方法,适合初学者使用-SHA-1 basic principle and C language realization method