搜索资源列表
SHA-based_session_authentication_technology
- SHA-based session authentication technology SHA-based session authentication technology
SECURE HASH STANDARD (sha)
- SHA 加密算法标准说明文件, 详细介绍相关的算法
sha512
- sha-512散列函数 sha-512散列函数-THIS SOFTWARE IS PROVIDED BY ALLAN SADDI AND HIS CONTRIBUTORS ``AS IS * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PU
Software-Engineering-Theory-and-Practice
- Study Guide to Accompany Shari Lawrence Pfleeger s Software Engineering: Theory and Practice By Forrest Shull and Roseanne Tesoriero (very usefull book form student who study Software Engeneering)
returelossVSvswr
- 做RF电路,很有用的表格,可借鉴参考,谢谢。-wqeub qwu qkHS QJSHD S SHA AUA AUSHD AHS AJSH AHSJHD AHSJD AJSHDA DH AAHD AA SSS SSD FFDFD
SHAstandard
- 关于SHA系列散列算法标准说明文档,对于每个操作做有详细的说明,另外加入了例子说明。-SHA hash algorithm on the series of standard documents, so for each operation is described in detail, while adding the example.
sha1
- 散列算法sha-1 散列算法sha-1-THIS SOFTWARE IS PROVIDED BY ALLAN SADDI AND HIS CONTRIBUTORS ``AS IS * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOS
sha256
- 散列算法sha-256 散列算法sha-256-THIS SOFTWARE IS PROVIDED BY ALLAN SADDI AND HIS CONTRIBUTORS ``AS IS * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PU
sha384
- sha-384散列函数 sha-384散列函数-THIS SOFTWARE IS PROVIDED BY ALLAN SADDI AND HIS CONTRIBUTORS ``AS IS * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PU
sha
- sha散列函数 sha散列函数-THIS SOFTWARE IS PROVIDED BY ALLAN SADDI AND HIS CONTRIBUTORS ``AS IS * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
report
- report of project HMAC using SHA algorithm-report of project HMAC using SHA algorithm..
SHA-256(VCsharp)
- 应用密码课程设计;VC#2005环境;SHA-256简单功能,显示每次中间哈希结果。-Applied Cryptography course design VC# 2005 environment SHA-256 Simple function, showed intermediate hash result every time.
md5
- this is information about md5 and sha-1.
200712281543454887
- 陕西省地貌的SHA文件格式,可直接运用GEODA-shanxi china
IMPLEMENTATION-OT-SHA-1
- Report on SHA and hash. SHA-1 is a cryptographic hash function designed by the United States National and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". -Report on SHA
chou-yang-sha-jun
- 臭氧灭菌的相关资料Ozone sterilization-Ozone sterilization Ozone sterilization
SHA-1ImplementationOnFPGA
- 希算法SHA-1算法广泛地应用于电子商务、商用加密软件等信息安全领域。通过对SHA.1算法的深入 分析,提出了流水线结构的硬件实现方案。通过缩短关键路径,使用片内RAM代替LE寄存器实现流水线中间变量 的数据传递,有效地提高了工作频率和单位SHA-1算法的计算速度。这种硬件结构在Altera系列芯片上的实现性能 是Ahera商用SHA-1算法IP核的3倍以上。-Hash algorithm SHA-1 is used widely in cryptographic applicati
AD9826-single-SHA-Mode-clock-generationPdata-o___
- AD9826 single SHA-Mode: clock generation+data output errors
SHA-256
- sha is an algorithm for security purposes
SHA-1
- 用C语言编写的一个实现SHA-1加密的程序(Using C language to achieve a SHA-1 encryption program)