Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - SHA1
Search - SHA1 - List
DL : 0
用C++实现了一个SHA1的类,可直接加入工程中使用,也可作为应用参考。-With C++ Achieve a SHA1 class, can be directly used to join the project, the application can also be used as reference.
Update : 2024-05-19 Size : 4096 Publisher : yuvmen

DL : 1
sha_1加密运算模块,运算速率100Mbps,规格512位请大家参考-encryption algorithms sha_1 module, computing rate of 100Mbps, the specifications please refer to 512
Update : 2024-05-19 Size : 5120 Publisher : 刘文庆

DL : 0
基于抓包分析的Tracker欺骗程序,用于无痕迹伪造流量、自动识别Passport、含有SHA1算法-Based on the analysis of capture Tracker deception procedures for non-trace forged flow, automatic identification Passport, containing SHA1 algorithm
Update : 2024-05-19 Size : 156672 Publisher : Lolita

DL : 0
对字符串进行MD5和SHA1加密,分别显示出不同加密后的字符串,-Of string MD5 and SHA1 encryption, respectively, show a different encrypted string
Update : 2024-05-19 Size : 20480 Publisher : 高猛

这个windows编程,是完成MD5和SHA1加密过程的,可显示过程-The windows programming, is to complete the MD5 and SHA1 encryption process, to show the process of
Update : 2024-05-19 Size : 377856 Publisher : 高猛

DL : 0
在 IBM Cell 上實行 AES + SHA1 的加密.-At IBM Cell on the implementation of AES+ SHA1 encryption.
Update : 2024-05-19 Size : 1024 Publisher : none

这是一个用C语言写的sha1算法,调试过,是没有问题的 -This is a C language using the sha1 algorithm Writing, debugging, and is no problem
Update : 2024-05-19 Size : 3072 Publisher : 袁丽萍

DL : 0
摘要书法SHA1的实现,自己做的 比较简单 将算法的内容封装d-Abstract Calligraphy SHA1 implementation of their own will to do the relatively simple algorithm for the content of package dll
Update : 2024-05-19 Size : 2243584 Publisher : yushijun

DL : 0
通过SHA1,将输入的字符串提取摘要或输入的十六进制提取摘要并输出-Through SHA1, will enter a summary or extract the string of hexadecimal input and output extracted Abstract
Update : 2024-05-19 Size : 3805184 Publisher : 吴成刚

DL : 0
精简后的md5,hmac—md5 算法,方面程序调用
Update : 2024-05-19 Size : 2109440 Publisher : char

DL : 0
 SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-512 (这些有时候也被称做 SHA-2)。 -SHA (Secure Hash Algorithm, Secure Hash Algorithm translated) is a U.S. National Security Agency (NSA) design, the U.S. National Institute of Standards and Technology (NIST) released a series of password hash function. Formally known as the SHA family members of the first release in 1993. But now people take it the informal name of a SHA-0 in order to avoid confusion of its successor. Two years later, SHA-1, the first successor to SHA issued. There are four variants have been released to enhance the output of some minor changes to the scope and design: SHA-224, SHA-256, SHA-384 and SHA-512 (these are sometimes also known as SHA-2).
Update : 2024-05-19 Size : 1024 Publisher : 陈诚

neatupload,实现大文件的上传功能-neatupload, upload large files to achieve functional
Update : 2024-05-19 Size : 856064 Publisher : feng

在MCS51单片机上实现SHA1算法,可以产生20个字节的数字摘要-sha1 used in MCS51
Update : 2024-05-19 Size : 2048 Publisher : zheng

实现的封装类CTorrentParser,完成的主要任务有: 1.判断torrent文件是否有效 2.得到如下的重要信息: tracker服务器列表 文件列表 分块尺寸 分块个数 分块sha1的数组 3.其他的一些次要信息如发布者,发布日期,注释等 4.计算infohash -Metainfo files are bencoded dictionaries with the following keys: announce The URL of the tracker. info This maps to a dictionary, with keys described below. The name key maps to a string which is the suggested name to save the file (or directory) as. It is purely advisory. piece length maps to the number of bytes in each piece the file is split into. For the purposes of transfer, files are split into fixed-size pieces which are all the same length except for possibly the last one which may be truncated. Piece length is almost always a power of two, most commonly 218 = 256 K (BitTorrent prior to version 3.2 uses 220 = 1 M as default). pieces maps to a string whose length is a multiple of 20. It is to be subdivided into strings of length 20, each of which is the SHA1 hash of the piece at the corresponding index. There is also a key length or a key files, but not both or neither. If length is present then the download represents a single file, otherwise it represent
Update : 2024-05-19 Size : 3072 Publisher : 吴开红

DL : 0
ipsec_sha1的C源码。我们已经用于测试SHA1的erilog-ipsec_sha1 the C source code. SHA1 we have used to test the erilog
Update : 2024-05-19 Size : 38912 Publisher : 左宏权

DL : 0
一个sha 哈希密码支撑算法系列的程序 包括了sha1-Support for a password hash algorithm sha series of procedures including sha1
Update : 2024-05-19 Size : 4096 Publisher :

DL : 0
使用Openssl的HMAC运算样例, 支持X86和X64平台。-The use of the HMAC computation Openssl example, to support the X86 and X64 platforms.
Update : 2024-05-19 Size : 5490688 Publisher : chen

DL : 0
sha1 hashing , the output is in binary
Update : 2024-05-19 Size : 3072 Publisher : drbios

DL : 0
java语言编写的SHA散列算法,可以直接使用-java language SHA hash algorithm can be directly used
Update : 2024-05-19 Size : 2048 Publisher : 王瑶

DL : 0
散列算法sha-1 散列算法sha-1-THIS SOFTWARE IS PROVIDED BY ALLAN SADDI AND HIS CONTRIBUTORS ``AS IS * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL ALLAN SADDI OR HIS CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE.
Update : 2024-05-19 Size : 3072 Publisher : 王五
« 1 2 ... 10 11 12 13 14 1516 17 18 19 20 ... 27 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.