搜索结果
找到约 26 项符合
cryptographic 的查询结果
按分类筛选
Java编程 Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the N
Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
加密解密 Snefru is a cryptographic hash function invented by Ralph Merkle which supports 128-bit and 256-bit
Snefru is a cryptographic hash function invented by Ralph Merkle which supports 128-bit and 256-bit output.
加密解密 Delphi Cryptographic API Hash example using MD2 MD4 MD5 SHA1 GOST
Delphi Cryptographic API Hash example using MD2 MD4 MD5 SHA1 GOST
文章/文档 L0phtCrack是在NT平台上使用的口令审计工具。它能通过保存在NT操作系统中cryptographic hashes列表来破解用户口令的。
L0phtCrack是在NT平台上使用的口令审计工具。它能通过保存在NT操作系统中cryptographic hashes列表来破解用户口令的。
加密解密 fips1402.pdf
关于美国fips140的文档
SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
加密解密 This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message au
This standard describes a keyed-hash message authentication code (HMAC), a
mechanism for message authentication using cryptographic hash functions. HMAC can
be used with any iterative Approved cryptographic hash function, in combination with a
shared secret key. The cryptographic strength of HMAC de ...
文章/文档 this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryp
this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.
技术资料 国密算法和国际密码算法在车载单片机上应用的对比研究
文章介绍了车载网络安全和密码学应用的研究现状,结合前人的研究分析了国密SM4、SM3、SM2算法和对应国际密码算法的差异。在可编程的硬件加密模块上进行实验,从软件执行时间、运行内存占用等方面对比了国密算法和国际密码算法的性能。结果表明,国密SM系列算法和对应国际密码算法占用大小相当的运行内存,任何一种国密算法和对 ...
加密解密 The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which impl
The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which implements an extensible provider model that allows you to load a provider by specifying the required cryptographic algorithm rather than having to hardcode a specific provider.
VC书籍 Secure Programming Cookbook for C and C++ is an important new resource for developers serious about
Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, sy ...