搜索资源列表
Hash2131
- 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -1) understanding hash functions in network security applications (2) master Hash Function Principle 2 require (1) using any programming
Hash-SHA
- 密码算法中的单向散列函数之SHA算法的C代码-password algorithm for one-way hash algorithm SHA Function of C code
thexcs_src
- Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The original Tiger Hash code was taken from Tiger.Net which is written in Visual Basic. NET. Tiger Tree Hash算法的C#实现! -Tiger Tree Hash is constructed fr
sha256
- SHA-256源代码,三个对外的函数:void SHA256Init (SHA256Context *sc) void SHA256Update (SHA256Context *sc, const void *data, uint32_t len) void SHA256Final (SHA256Context *sc, uint8_t hash[SHA256_HASH_SIZE]) 第一个函数初始化,第二个函数输入要hash的字符串,第三个函数输出结果-SHA-256 sou
ASE-DSE-HASH-RSA
- ASE DSE HASH RSA加密和解密算法源码,测试文件,可以直接使用-ASE DSE HASH RSA encryption and decryption source code, and test files, can be used directly.
MD5Encode
- Java 16位MD5 Hash code generator-Java 16 md5 generator
2005112814355760
- 高亮语法类 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -syntax highlighter category 1) to understand the hash function in network security applications (2) real grasp Hash Function th
MD5
- Labwindows 哈希函数,实现MD5校验码读取的代码-Labwindows hash function, the realization of MD5 checksum code to read the code
hash
- (1)为班级学生花名册建立开桶或闭桶散列表。 (2)友好性:界面要友好,输入有提示,尽量展示人性化。 (3)可读性:源程序代码清晰、有层次。 (4)健壮性:对输入的数据有纠错处理。-(1) class roster for the establishment of open or closed barrels barrels hash table. (2) friendly: the interface should be friendly, to bring in people w
md6_c
- 目前最新的MD6 Hash 算法源码,下一代的安全散列验证算法。-The new MD6 hash function,the next generation hash function.
HASH
- hash加密算法,其中包含原理与源代码,可以学习下经典加密算法,脱壳时可能有用!-hash encryption algorithm, which includes the principle and source code, you can study under the classical encryption algorithm may be useful when the shell!
doc2
- This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the
sha-1
- sah-1(Secure Hash Algorithm,安全散列算法)算法源程序-the c sourse code for sha-1(Secure Hash Algorithm) Algorithm
MD5-collision-process(c-source-code)
- 根据hash函数破解国际通用密码MD5的C程序,根据王小云的碰撞算法。-Hash function in accordance with international crack MD5 passwords of C procedures, according to Wang Xiaoyun of the collision algorithm.
HASH_MD5
- HASH算法MD5的代码实验,编译可以直接使用的MD5源代码-HASH algorithm MD5 code experiment can be directly used to compile the source code for MD5
md5.tar
- MD5 Hash Verilog code
AES-SHA1
- Text editor that saves contents in encrypted text file and adds Hash content at the bottom. (Basic usage of AES/Sha-1 Algorithms) Code is in Visual C#
HMAC-SHA
- hmac using SHA algorithm source code-hmac using SHA algorithm source code...
GOSThesh
- GOST hash algorithm source code
htable.tar
- 一个纯C实现的哈希表示例代码,实现了通用哈希表的创建、查找、添加、删除、销毁等功能。-A pure C implementation of the hash code that patients achieve a common hash table to create, find, add, delete, destroy and other functions.