搜索资源列表
sah-1
- 加密解密SHA_1算法对当前比较热门话题一个参考,源于算法作者的网站-SHA_1 encryption and decryption algorithm on the current hot topic of a reference, stems from the author's website Algorithm
sha_1
- 还是图形学的作业,投影.先点击左键画图,点右键表示结束绘图,再点左键则投影开始,可在不同方向上投影-or graphics operations, the projector. Click on the menu to draw first, the end of said right-point mapping, Left another point projector, the projector different directi
sah-1
- 加密解密SHA_1算法对当前比较热门话题一个参考,源于算法作者的网站-SHA_1 encryption and decryption algorithm on the current hot topic of a reference, stems from the author's website Algorithm
sha_1
- 还是图形学的作业,投影.先点击左键画图,点右键表示结束绘图,再点左键则投影开始,可在不同方向上投影-or graphics operations, the projector. Click on the menu to draw first, the end of said right-point mapping, Left another point projector, the projector different directi
SHA1_TOP
- sha_1加密运算模块,运算速率100Mbps,规格512位请大家参考-encryption algorithms sha_1 module, computing rate of 100Mbps, the specifications please refer to 512
HMAC-SHA
- hmac using SHA algorithm source code-hmac using SHA algorithm source code...
sha_1
- SHA1 硬件实现算法,基于gmp的库,linux GCC 编译-sha1 agorithms for hardware implemetetion
sha1
- encryption algorithm to hash sha_1
SHA_1
- sha_1加密算法,自己写的,绝对原创,绝对可运行-sha_1 encryption algorithm, wrote it myself, absolutely original, absolutely can run
code
- SHA_1算法填充部分的VHDL实现,让输入的数据可以转换为SHA_1算法所需要的512bit的数据-SHA_1 algorithm filling part of the VHDL realization, let the input data can be converted to SHA_1 algorithm need 512 bit data
sha_1
- sha-1算法实现的加密的代码。是目前使用最广泛的散列算法,在数字签名标准中被使用-sha-1 algorithm, the encryption code. Is currently the most widely used hash algorithm to be used in the Digital Signature Standard
sha_1
- 计算sha-1,然后再进行base64转码-Calculate sha-1, and then base64 transcoding
SHA_1
- 本代码是SHA_1的加密算法,用的是VC编程,有需要的尽管下载-This code is SHA_1 encryption algorithm, VC programming, the need to download
SHA-1
- SHA_1算法描述的实现-000000000000000000 algorithm implementation described SHA_1
SHA
- 可将txt文件内容求hash值,具体算法为sha_1 算法来源为《密码学原理与实践》 冯登国 学生原创,可执行(The contents of the txt file for the hash value, the specific algorithm for the sha_1 algorithm source for the principle and practice of "Feng" cryptogra