SHA Hash algorithm. This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA- 512.
资源简介:SHA Hash algorithm. This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA- 512.
上传时间: 2014-01-01
上传用户:teddysha
资源简介:This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination w...
上传时间: 2014-01-07
上传用户:凤临西北
资源简介:SHA-1(Secure Hash algorithm)是美国国家标准局(National Institute of Standard and Technology NIST)为了配合数位签章演算法(Digital Signature algorithm DSA)的使用所发布的联邦资讯处理标准-FIPS PUB 180-1(Federal Information Processing Standard Pub...
上传时间: 2014-01-01
上传用户:gxf2016
资源简介:This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied...
上传时间: 2017-03-08
上传用户:xuanchangri
资源简介:This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied...
上传时间: 2014-01-10
上传用户:yyq123456789
资源简介: SHA (Secure Hash algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后...
上传时间: 2014-03-02
上传用户:thuyenvinh
资源简介:SHA256 algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash algori...
上传时间: 2014-11-09
上传用户:1109003457
资源简介:This ECMA Standard specifies the form and establishes the interpretation of programs written in the C# programming language. It specifies The representation of C# programs The syntax and constraints of the C# language The semantic rul...
上传时间: 2013-12-18
上传用户:chenjjer
资源简介:sah-1(Secure Hash algorithm,安全散列算法)算法源程序
上传时间: 2017-07-19
上传用户:梧桐
资源简介:Enclosed in this distribution are four projects: MD5DLLTest: Visual basic project which runs the MD5 test suite against a MD5 DLL (see below). VbMD5: A Visual Basic native MD5 message digest class based on the RSA reference ...
上传时间: 2016-06-08
上传用户:com1com2
资源简介:hash algorithm ,with auto expand features
上传时间: 2014-08-18
上传用户:a6697238
资源简介:Tiger Tree Hash is constructed from two parts, the Tiger Hash algorithm and Merkle Tree. The original Tiger Hash code was taken from Tiger.Net which is written in Visual Basic. NET. Tiger Tree Hash算法的C#实现!
上传时间: 2015-10-09
上传用户:vodssv
资源简介:LCS algorithm, this is a c++ code for lcs(Longest Common Subsequence)
上传时间: 2013-12-25
上传用户:李梦晗
资源简介:this formality is four number calculter,it is I play the host in person.
上传时间: 2014-08-29
上传用户:hebmuljb
资源简介:SHA-1 algorithm implemented in C.
上传时间: 2016-07-18
上传用户:onewq
资源简介:this algorithm this is a good
上传时间: 2014-01-25
上传用户:
资源简介:Stereo-Vision circuit description, Aug 2002, Ahmad Darabiha This design contains four top level circuits: sv_chip0.vhd, sv_chip1.vhd, sv_chip2.vhd and sv_chip3.vhd each of them built by one Virtex2000E fpga chip. This design is hierarchi...
上传时间: 2017-03-19
上传用户:comua
资源简介:this is decision tree ID3 algorithm, this algorithm is one of decision tree algorithm like cart, chaid, c4.5, etc
上传时间: 2017-04-23
上传用户:498732662
资源简介:This document specifies a subset of the C programming language which is intended to be suitable for embedded automotive systems up to and including safety integrity level 3 (as defined in the MISRA Guidelines). It contains a list of rules...
上传时间: 2013-12-11
上传用户:cursor
资源简介:This general hash alogorithm implementation. This code has expamle for hash implementaio for 16bit to 64bit processor implementations
上传时间: 2014-02-07
上传用户:15736969615
资源简介:This document specifies a collection of compiler directives, library routines, and environment variables that can be used to specify SHAred-memory parallelism in C, C++ and Fortran programs. This functionality collectively defines the spe...
上传时间: 2013-12-25
上传用户:shinesyh
资源简介:John Wiley & Sons - JPEG2000 Standard for Image Compression Concepts algorithms and VLSI Architectures 2005
上传时间: 2013-12-04
上传用户:tyler
资源简介:This a simple bootloader for AT91SAM7{S,X}{64,128,256} processors. It permits you to download new code to the device over USB. This bootrom is installed at address 0x00000000 in the ARM, which means that it is the first piece of code to ...
上传时间: 2015-11-30
上传用户:shus521
资源简介:SHA加密算法是目前广为应用的重要加密方法之一。而SHA-1 生成 160 位的消息摘要,虽然执行更慢,却被认为更安全。明文消息的最大长度可达到 264 位。下面是网络上流传的SHA算法,我们自己调试了一下,已经通过。现把主函数和算法函数贴出来。
上传时间: 2013-11-26
上传用户:13517191407
资源简介:JPEG2000 Standard for Image Compression Concepts, algorithms and VLSI Architectures
上传时间: 2013-12-23
上传用户:cc1915
资源简介:hash表:用C++实现的HASH表及测试
上传时间: 2016-04-24
上传用户:yzy6007
资源简介:hash函数集合,包含现行的多种hash加密函数
上传时间: 2016-05-19
上传用户:ztj182002
资源简介:简单的hash计算的类。实现了hash计算,对处理字符串,进行加密和检索很有帮助。
上传时间: 2013-12-11
上传用户:xz85592677
资源简介:以前发的那个只实现了SHA-1, 现在补全了, SHA-160, SHA-224, SHA-256, SHA-384, SHA-512
上传时间: 2016-10-07
上传用户:qweqweqwe
资源简介:This program proposed improved adaptive genetic algorithms saccording to the idea that the best individualon current generation should bekept tonext generation,but the best individual should becrossed and mutated by some probability.
上传时间: 2014-01-01
上传用户:冇尾飞铊