DSSZ
www.dssz.org
Search
Sign in
Create an account
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - SHA1
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - SHA1 - List
【
Crack Hack
】
SHA1_in_C++
DL : 0
用C++实现了一个SHA1的类,可直接加入工程中使用,也可作为应用参考。-With C++ Achieve a SHA1 class, can be directly used to join the project, the application can also be used as reference.
Update
: 2024-05-19
Size
: 4096
Publisher
:
yuvmen
【
Crack Hack
】
SHA1_TOP
DL : 1
sha_1加密运算模块,运算速率100Mbps,规格512位请大家参考-encryption algorithms sha_1 module, computing rate of 100Mbps, the specifications please refer to 512
Update
: 2024-05-19
Size
: 5120
Publisher
:
刘文庆
【
P2P
】
VB_BitTorrentFlood
DL : 0
基于抓包分析的Tracker欺骗程序,用于无痕迹伪造流量、自动识别Passport、含有SHA1算法-Based on the analysis of capture Tracker deception procedures for non-trace forged flow, automatic identification Passport, containing SHA1 algorithm
Update
: 2024-05-19
Size
: 156672
Publisher
:
Lolita
【
Crack Hack
】
encrypt
DL : 0
对字符串进行MD5和SHA1加密,分别显示出不同加密后的字符串,-Of string MD5 and SHA1 encryption, respectively, show a different encrypted string
Update
: 2024-05-19
Size
: 20480
Publisher
:
高猛
【
Crack Hack
】
encryptwindows
DL : 0
这个windows编程,是完成MD5和SHA1加密过程的,可显示过程-The windows programming, is to complete the MD5 and SHA1 encryption process, to show the process of
Update
: 2024-05-19
Size
: 377856
Publisher
:
高猛
【
Crack Hack
】
AESsource
DL : 0
在 IBM Cell 上實行 AES + SHA1 的加密.-At IBM Cell on the implementation of AES+ SHA1 encryption.
Update
: 2024-05-19
Size
: 1024
Publisher
:
none
【
Crack Hack
】
79419099mysha1
DL : 0
这是一个用C语言写的sha1算法,调试过,是没有问题的 -This is a C language using the sha1 algorithm Writing, debugging, and is no problem
Update
: 2024-05-19
Size
: 3072
Publisher
:
袁丽萍
【
Crack Hack
】
SHA12dll
DL : 0
摘要书法SHA1的实现,自己做的 比较简单 将算法的内容封装d-Abstract Calligraphy SHA1 implementation of their own will to do the relatively simple algorithm for the content of package dll
Update
: 2024-05-19
Size
: 2243584
Publisher
:
yushijun
【
Other
】
SHA12dll
DL : 0
通过SHA1,将输入的字符串提取摘要或输入的十六进制提取摘要并输出-Through SHA1, will enter a summary or extract the string of hexadecimal input and output extracted Abstract
Update
: 2024-05-19
Size
: 3805184
Publisher
:
吴成刚
【
Crack Hack
】
md5
DL : 0
精简后的md5,hmac—md5 算法,方面程序调用
Update
: 2024-05-19
Size
: 2109440
Publisher
:
char
【
JSP/Java
】
sha1
DL : 0
SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-512 (这些有时候也被称做 SHA-2)。 -SHA (Secure Hash Algorithm, Secure Hash Algorithm translated) is a U.S. National Security Agency (NSA) design, the U.S. National Institute of Standards and Technology (NIST) released a series of password hash function. Formally known as the SHA family members of the first release in 1993. But now people take it the informal name of a SHA-0 in order to avoid confusion of its successor. Two years later, SHA-1, the first successor to SHA issued. There are four variants have been released to enhance the output of some minor changes to the scope and design: SHA-224, SHA-256, SHA-384 and SHA-512 (these are sometimes also known as SHA-2).
Update
: 2024-05-19
Size
: 1024
Publisher
:
陈诚
【
Internet-Network
】
NeatUpload
DL : 0
neatupload,实现大文件的上传功能-neatupload, upload large files to achieve functional
Update
: 2024-05-19
Size
: 856064
Publisher
:
feng
【
Embeded-SCM Develop
】
shaforMCS51
DL : 0
在MCS51单片机上实现SHA1算法,可以产生20个字节的数字摘要-sha1 used in MCS51
Update
: 2024-05-19
Size
: 2048
Publisher
:
zheng
【
Windows Develop
】
TorrentParser
DL : 0
实现的封装类CTorrentParser,完成的主要任务有: 1.判断torrent文件是否有效 2.得到如下的重要信息: tracker服务器列表 文件列表 分块尺寸 分块个数 分块sha1的数组 3.其他的一些次要信息如发布者,发布日期,注释等 4.计算infohash -Metainfo files are bencoded dictionaries with the following keys: announce The URL of the tracker. info This maps to a dictionary, with keys described below. The name key maps to a string which is the suggested name to save the file (or directory) as. It is purely advisory. piece length maps to the number of bytes in each piece the file is split into. For the purposes of transfer, files are split into fixed-size pieces which are all the same length except for possibly the last one which may be truncated. Piece length is almost always a power of two, most commonly 218 = 256 K (BitTorrent prior to version 3.2 uses 220 = 1 M as default). pieces maps to a string whose length is a multiple of 20. It is to be subdivided into strings of length 20, each of which is the SHA1 hash of the piece at the corresponding index. There is also a key length or a key files, but not both or neither. If length is present then the download represents a single file, otherwise it represent
Update
: 2024-05-19
Size
: 3072
Publisher
:
吴开红
【
Crack Hack
】
ipsec_sha1
DL : 0
ipsec_sha1的C源码。我们已经用于测试SHA1的erilog-ipsec_sha1 the C source code. SHA1 we have used to test the erilog
Update
: 2024-05-19
Size
: 38912
Publisher
:
左宏权
【
Crack Hack
】
sha
DL : 0
一个sha 哈希密码支撑算法系列的程序 包括了sha1-Support for a password hash algorithm sha series of procedures including sha1
Update
: 2024-05-19
Size
: 4096
Publisher
:
聰
【
CA auth
】
HAMC
DL : 0
使用Openssl的HMAC运算样例, 支持X86和X64平台。-The use of the HMAC computation Openssl example, to support the X86 and X64 platforms.
Update
: 2024-05-19
Size
: 5490688
Publisher
:
chen
【
Crack Hack
】
ejemplo_xml
DL : 0
sha1 hashing , the output is in binary
Update
: 2024-05-19
Size
: 3072
Publisher
:
drbios
【
JSP/Java
】
SHA1
DL : 0
java语言编写的SHA散列算法,可以直接使用-java language SHA hash algorithm can be directly used
Update
: 2024-05-19
Size
: 2048
Publisher
:
王瑶
【
File Format
】
sha1
DL : 0
散列算法sha-1 散列算法sha-1-THIS SOFTWARE IS PROVIDED BY ALLAN SADDI AND HIS CONTRIBUTORS ``AS IS * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL ALLAN SADDI OR HIS CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE.
Update
: 2024-05-19
Size
: 3072
Publisher
:
王五
«
1
2
...
10
11
12
13
14
15
16
17
18
19
20
...
27
»
DSSZ
is the largest source code store in internet!
Contact us :
1999-2046
DSSZ
All Rights Reserved.