搜索资源列表
sha-1
- SHA-1Hash函数源码,可以对任何文件做Hash,得到的Hash值为160位。具有抗强碰撞,弱碰撞等能力。虽然王小云已经找到了个别碰撞。但在新的好的hash函数出来之前仍将被广泛使用。-SHA-1Hash function source, any document can be done right hash, the hash value of 160. Anti-collision, the weak capabilities of the collision. Although Bru
sha256
- SHA-256源代码,三个对外的函数:void SHA256Init (SHA256Context *sc) void SHA256Update (SHA256Context *sc, const void *data, uint32_t len) void SHA256Final (SHA256Context *sc, uint8_t hash[SHA256_HASH_SIZE]) 第一个函数初始化,第二个函数输入要hash的字符串,第三个函数输出结果-SHA-256 sou
KeccakReferenceAndOptimized-1.1
- Keccak hash加密算法,最新的数据加密方案,适用于软件编码。-Keccak hash function, for software.Newest data hash function.
2005112814355760
- 高亮语法类 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -syntax highlighter category 1) to understand the hash function in network security applications (2) real grasp Hash Function th
snefru
- Snefru is a cryptographic hash function invented by Ralph Merkle which supports 128-bit and 256-bit output.
hash
- 实现了hash散列函数的功能并有验证结果-Achieved a hash function hash function as well as to verify the results of
MD5
- Labwindows 哈希函数,实现MD5校验码读取的代码-Labwindows hash function, the realization of MD5 checksum code to read the code
sha_core
- 安全散列函数的VERILOG实现,通过了fpga验证,在系统正可以直接当IP盒应用-Secure Hash Function VERILOG achieve, through the FPGA verification, the system is can be directly applied when the IP box
paixu
- hash表的使用,使用hash函数并包含解决冲突的方法-the use of hash table, use the hash function and includes a solution to the conflict
md6_c
- 目前最新的MD6 Hash 算法源码,下一代的安全散列验证算法。-The new MD6 hash function,the next generation hash function.
fork256
- the hash function FORK-256,256位的安全散列验证算法,SHA-256的替代者。-the hash function FORK-256,256-bit secure hash authentication algorithm, SHA-256 replacement for him.
hash
- realization of hash function
sha2-1.0
- SHA-2 (Secure Hash Algorithm 2) hash function, written in C language.
sha_core_latest.tar
- sha1_core_Verilog this is a sha1 function by using Verilog
HASH
- 数字签名中哈希函数的分析与研究,主要分析哈希函数的结构。-Hash function in the digital signature analysis and research, the main structure of the hash function.
hash
- 亲测,很好用的hash function-Pro-test, a good hash function used
Efficient_Tweakable_Enciphering_Schemes
- We present several constructions of tweakable enciphering schemes which use a single encryption layer between two layers of universal hash function computation. The earliest known construction of this type is due to Naor and Reingold, where the e
sha1
- 安全散列算法(Secure Hash Algorithm)能计算出一个数字消息所对应到的,长度固定的字符串(又称消息摘要)。且若输入的消息不同,它们对应到不同字符串的机率很高;而SHA是FIPS所认证的五种安全散列算法。-sha1 classic C/C++ algorithm Version 1.5- 2005-01-01 - 64-bit compiler compatibility added - Made variable wiping optional (defi
hash
- 哈希函数的matlab代码,此函数不可逆,具有加密功能。-Hash function matlab code, this function is not reversible, with encryption features.
MD5散列函数的MATLAB代码
- 利用散列哈希函数对信息进行散列,产生一个定长的信息摘要,从而可实现消息的认证和完整性验证(Hash function is used to hash information to produce a certain length of information summary, which can realize message authentication and integrity verification.)
