Keccak hash加密算法,最新的数据加密方案,适用于软件编码。
上传时间: 2013-12-30
上传用户:edisonfather
the hash function FORK-256,256位的安全散列验证算法,SHA-256的替代者。
上传时间: 2017-03-01
上传用户:thuyenvinh
hash法编写图书查询,建立数目,编号的图书系统的源代码
上传时间: 2017-03-08
上传用户:libinxny
hash加密算法,其中包含原理与源代码,可以学习下经典加密算法,脱壳时可能有用!
上传时间: 2014-06-06
上传用户:zhouchang199
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functions implement
上传时间: 2017-03-08
上传用户:xuanchangri
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functions implement
上传时间: 2014-01-10
上传用户:yyq123456789
几种c语言的hash算法,希望能提供帮助
上传时间: 2013-12-23
上传用户:bruce
Delphi Cryptographic API hash example using MD2 MD4 MD5 SHA1 GOST
标签: Cryptographic example Delphi using
上传时间: 2017-03-11
上传用户:cazjing
简要论述了Linux下图形配置界面设计的Gtk+的技术原理。基于Gtk+库设计了数控机 床良好的人机操作界面,对其中的重点问题hash表和回调函数进行说明。
上传时间: 2017-03-12
上传用户:lanhuaying
Linux实现hash算法! 效率比较高。。。。。
上传时间: 2017-04-10
上传用户:cursor