Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - SHA1
Search - SHA1 - List
只包括两个核心文件sha1.cpp及sha1.h 计算数据的sha1摘要。简单,好用。 由于bit endian及little endian的原因,有些计算sha1摘要的算法计算出来的结果与正确结果有差异。此源码经过测试,与RFC里列出的测试结果匹配。-only two core document sha1.cpp sha1.h calculation and data sha1 Abstract. Simple and Easy. Because bit endian and little endian of reasons, some of the Abstract sha1 calculation algorithm and the result of differences in the correct results. This source tested, and the RFC to set out the test results match.
Update : 2024-05-08 Size : 12288 Publisher : 黄永昌

DL : 0
加密算法SHA1的C语言实现示例,是一个C++类实现-The example of encryption arithmetic SHA1 using C program,which is a C++ class.
Update : 2024-05-08 Size : 4096 Publisher : 李力

SHA1加密算法的vc++实现 SHA1加密算法的vc++实现-SHA1 encryption algorithm vc achieve SHA1 encryption algorithm v c SHA1 encryption algorithm to achieve the vc achieve SHA1 encryption algorithm to achieve the vc
Update : 2024-05-08 Size : 32768 Publisher : 小白

DL : 0
sha1sum验证算法,cd分发映像文件的,sha1值得计算,验证sha1-sha1sum verification algorithm, distributed cd image files, sha1 worth calculation, the certification sha1
Update : 2024-05-08 Size : 3072 Publisher : mk

DL : 0
准算法模块是集DES、3DES、AES、RSA、MD5、BlowFish、TEA、RC6等标准算法为一体的算法包,同时在模块中使用了Anti-Debug和程序自校验功能(涉及到软件的加壳和CRC32)、软件使用次数限制,更好的保护您的软件。在模块中作者给出了每种算法详细调用方法,使用者可以根据自己的需要来进行选择。现暂时给出在VB、VC、Delphi三种开发语言中的调用方法,其他语言的调用方法可与我们联系获得,具体可以参看例子程序;现更新DLL可能被破解者替换的漏洞,并对DLL进行了加壳,增加了CRC校验功能,For Delphi还增加了对DeDe的Anti代码,在代码中给出了在NT/2000/XP下关闭计算机的函数。 增加了MD2、MD3、SHA1、SHA256、SHA384、SHA512、HAVAL128、HAVAL160、HAVAL192、HAVAL224、HAVAL256、GOST、TIGER128、TIGER160、TIGER192、RIPEMD128、RIPEMD160、CRC32、CRC32B、ADLER32多种算法-prospective algorithm module combines DES, 3DES, AES, RSA, MD5, BlowFish. TEA, RC6 algorithm standards for the integration of the algorithm package, At the same time the use of the module Anti-Debug and procedures since the checksum function (related to the shell and software CRC 32), software usage restrictions and better protect your software. The module is the author of the algorithm in detail each call, users can meet their own needs to choose. Is temporarily given in VB, VC, Delphi development of the three languages of the call, other languages can call methods and access to our contacts, can see examples of specific procedures; Update DLL is likely to be those who break the replacement of the loopholes, and the shell DLL, an increase of CRC function, For Delphi also added to the Anti
Update : 2024-05-08 Size : 234496 Publisher : 马克

DL : 0
密码加密工具.rar 含md5,sha1,guid-password encryption tools. Rar- md5, sha1, guid
Update : 2024-05-08 Size : 28672 Publisher : 7421021

DL : 0
hmac的verilog代码, 通过控制字选择进行sha1运算或hmac运算-hmac the verilog code word through the control options or hmac sha1 Operational Operational
Update : 2024-05-08 Size : 559104 Publisher : lijialu

Othersha1
DL : 0
普通中的最普通算法,练练手,多关照! 普通
Update : 2024-05-08 Size : 38912 Publisher :

DL : 1
计算文件hash值的源代码,包含crc,md2,md4,md5,sha,sha1,sha256,ra-Calculated hash value of document
Update : 2024-05-08 Size : 281600 Publisher : 风成

MFC下写个MD5和SHA1文件摘要应用程序,不限文件大小-Under the MFC write a summary of MD5 and SHA1 file applications, not limited to file size
Update : 2024-05-08 Size : 56320 Publisher :

本代码是SHA1用C语言实现的源代码,SHA1与MD5是目前最为常用的HASH算法,可用于认证及签名等-This code is SHA1 with C language source code, SHA1 and MD5 is currently the most commonly used HASH algorithm, can be used for authentication and signatures
Update : 2024-05-08 Size : 53248 Publisher : cl

本代码是C语言实现的MD5算法的源代码。MD5和SHA1是目前最为常用的HASH算法,可用于认证签名等。-This code is the C language source code of MD5 algorithm. MD5 and SHA1 is the most commonly used HASH algorithm, can be used for certification signatures.
Update : 2024-05-08 Size : 25600 Publisher : cl

DL : 0
hash, md5, sha1 algrithm
Update : 2024-05-08 Size : 71680 Publisher : apollo

DL : 0
SHA-1 in C By Steve Reid -SHA-1 in CBy Steve Reid
Update : 2024-05-08 Size : 2048 Publisher : dlrobin

DL : 0
实现密码算法里的sha-1功能对数据进行加密过程当中进行哈希-The realization of cryptographic algorithm in the sha-1 function to encrypt data to carry out the process of hash
Update : 2024-05-08 Size : 221184 Publisher : abc

MD2、MD3、SHA1、SHA256、SHA384、SHA512、HAVAL128、HAVAL160、HAVAL192、HAVAL224、HAVAL256、GOST、TIGER128、TIGER160、TIGER192、RIPEMD128、RIPEMD160、CRC32、CRC32B、ADLER32多种算法-MD2, MD3, SHA1, SHA256, SHA384, SHA512, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, GOST, TIGER128, TIGER160, TIGER192, RIPEMD128, RIPEMD160, CRC32, CRC32B, ADLER32 a variety of algorithms
Update : 2024-05-08 Size : 236544 Publisher : bai

DL : 0
SHA-1的算法源码,输入一段用户名,输入该用户名的HASH码-SHA-1 algorithm source, enter a period of user name, enter the user name of the HASH code
Update : 2024-05-08 Size : 870400 Publisher : eric

DL : 0
SHA-1 algorithm implemented in C.
Update : 2024-05-08 Size : 5120 Publisher : Sir G

DL : 0
SHA1算法的C实现 比较适用于一些微控制器加密处理-SHA1 algorithm realize comparative C apply to deal with encryption microcontroller
Update : 2024-05-08 Size : 1024 Publisher : 陈诚

DL : 0
vc++下的程序,可以计算文件或字符串的sha1值。用两个类SHA1Ex和SHA1实现这个功能。代码很详细,细看就明白了-vc++ procedure can calculate sha1 file or string value. With two types of SHA1Ex and SHA1 realize this function. Code is very detailed and take a closer look will understand
Update : 2024-05-08 Size : 7861248 Publisher :
« 1 2 3 45 6 7 8 9 10 ... 27 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.