搜索资源列表
sha1
- 实现密码算法里的sha-1功能对数据进行加密过程当中进行哈希
sha1_v01.zip
- SHA-1加密算法的IP核,内涵文档,仿真测试文件,SHA-1 encryption algorithm of the IP core, the connotation of documents, simulation test file
SM3
- SM3算法是商密公开的算法,替代非对称算法中的SHA-1算法。-SM3 algorithm is public business secret algorithm, alternative non-symmetric algorithm SHA-1 algorithm.
SHA-1
- SHA1散列算法,在AVR上实现SHA-1算法应用于DS1961卡的读写操作-SHA1 hash algorithm on the AVR to achieve DS1961 SHA-1 algorithm is applied to the card read and write operations
SHAProj
- SHA家族加密算法实现方式, C语言版本-SHA algorithm
sha-1
- sah-1(Secure Hash Algorithm,安全散列算法)算法源程序-the c sourse code for sha-1(Secure Hash Algorithm) Algorithm
MD_SDK
- C++源码实现完整讯息摘要类别加解密方法,包函MD4 - both 128 bits and 256 bits, MD5, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, SHA-1, SHA-256, SHA -384, SHA-512, HAVAL SERIES及BASE 64-C++ source code to achieve a complete summary of categories of message encryption an
SHA1
- security encryption algorithm sha-1
HMAC-SHA
- hmac using SHA algorithm source code-hmac using SHA algorithm source code...
sha
- SHA加解密算法,SHA是安全散列算法,c语言实现的Benchmark-SHA encryption and decryption algorithm
sha11
- SHA-11 implementation in C-SHA-11 implementation in C++
SHA1
- SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。-SHA-1
sha1
- In cryptography, SHA-1 is a cryptographic hash function designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm.
SHA256
- In cryptography, SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Se
sha1
- 基于C语言的sha-160认证代码,提供文件哈希和字符串哈希,希望对大家有帮助-Sha-160 certification based on C language code, the file hash and string has
MC_Crypt
- 一套非常好用的软件加密库,提供AES、DES、MD5、SHA、RSA等多种加密方式,可以在VC、VB、DELPHI等开发平台下使用,并附有各开发工具下的样例程序。 -A very easy to use software encryption libraries, AES, DES, MD5, SHA, RSA and other encryption methods can be used in VC, VB, DELPHI, and other development platforms
sha1
- Use to do SHA1 encode,SHA-1 produces a 160-bit message digest based on principles similar to those used by Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design.-Use to do SHA1 encode,
mrshs
- sha 1 implementation
haxihanshu-SHA-1suanfa
- 哈希函数SHA-1的c实现,能正常运行。很实用,适合用来学习sha-1,希望对你有帮助。-A hash function is SHA-1 (c) achieve normal operation. Very practical, ideal for learning the sha-1, you want to help.
SHA
- SHA-1 produces a message digest based on principles similar to those used by Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design.SHA-2 is a set of cryptographic hash functions (SHA-22