搜索资源列表
sha源码.rar
- sha源代码
sha 加密算法 C实现
- 包括 sha1 sha-224,sha-256,sha-384,sha-512 c++测试工具
SHA-1.rar
- MAC算法SHA—1算法的C语言实现源码,SHA-1 algorithm for the C language source
sha
- C实现的SHA-1,SHA-256,SHA-512算法-。
SHA-1
- SHA-1算法实现的详细资料。里面还包括了具体加解密前后的样本例子。-SHA-1 algorithm implementation details. Which also includes specific examples of a sample before and after the encryption and decryption.
SHA-1
- SHA-1算法的C语言实现,计算消息的散列值,用于安全通信-SHA-1 algorithm of the C language implementation, computing the hash value information for secure communications
sha源码
- sha源代码-sha source code
SHA-1
- SHA-1加密算法源代码.具有完整的加解密过程,性能比较好-SHA-1 encryption algorithm source code. With complete encryption and decryption process, the performance is better
sha
- 支持SHA算法,对文件或者字符串进行散列计算,直接可以应用在程序中,形成文件摘要。-To support the SHA algorithm, on paper or string hash calculation can be applied directly in the proceedings, the formation of a document containing a summary.
sha
- sha加密算法实现,经过FPGA验证的!-sha encryption algorithm, after FPGA validation!
sha-1
- 用SHA算法实现对任意文件的hash摘要,并且把hash摘要值(至少为160bit)存入另一个文件,形如: hash inputfile hashvaluefile 说明:SHA算法的实现至少为160bit,或者可以选择256,384或者512的,可以查阅相关资料,按照标准来实现(hash的算法是否正确,可以和网上的标准算法对比,用相同的输入看是否能够得到相同的输出)控制台编程: int main(int argc, char *argv[ ]) -Programme f
sha-1
- sah-1(Secure Hash Algorithm,安全散列算法)算法源程序-the c sourse code for sha-1(Secure Hash Algorithm) Algorithm
sha-1
- 一个非常好的SHA-1源代码,在其目录下建立一个a.txt,将明文保存在a.txt中,在执行SHA-1就行-SHA-1
SHA
- PIC汇编实现SHA加密算法。在PIC16F73上实现-SHA ALGORITHM BY PIC assembly language
SHA-1
- data encryption for SHA-1
Sha
- This is SHA-1 allgorithmwhich may be used to generate message digests. This is written in C language and runs in Linux environment.
HMAC-SHA
- hmac using SHA algorithm source code-hmac using SHA algorithm source code...
sha
- SHA加解密算法,SHA是安全散列算法,c语言实现的Benchmark-SHA encryption and decryption algorithm
aes-rsa-md5-des-sha
- aes rsa md1245 des sha128,244,256(aes rsa md1245 des sha)
安全Hash算法SHA-1的实现
- Hash函数是提供数据完整性保障的一个重要工具。本次实验,我们希望通过上机操作,使 同学们对安全Hash算法SHA-1的基本原理有一个全面的理解。通过本次实验,使学生掌握对 Hash函数的应用,为后面数字签名方案的学习打下基础。(The Hash function is an important tool for providing data integrity protection. In this experiment, we hope to have a comprehensive und