-
-
-
doc1.zip
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented ... the user
is used as the source message from which the hash code (key) is
generated using the SHA algorithm. Then ...
-
doc2.zip
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented ... the user
is used as the source message from which the hash code (key) is
generated using the SHA algorithm. Then ...
-
-
-
-
pHash-0.4.tar.gz
... is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image ... on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small ...
-
sha512.rar
SHA512 is a hash function. You can use sha512 with an asymetric method to sign a document.
-
-
-