Cryptographic hash functions

Java general purpose hash function algorithms in java

The following java project contains the java source code and java examples used for java general purpose hash function algorithms. The General Hash Function Algorithm library contains implementations for a series of commonly used additive and rotative string hashing algorithm in the Java programming language. For more information please visit: http://www.partow.net/programming/hashfunctions/index.html

Directory traversal and duplicate file deletion using the sha 256 hash in matlab

The following Matlab project contains the source code and Matlab examples used for directory traversal and duplicate file deletion using the sha 256 hash. PURGETREE - On Windows systems, rapidly identifies duplicate files in an entire directory tree using the SHA-256 hash algorithm, then creates and executes a batch file to rapidly delete all but one of the duplicates.

String2hash in matlab

The following Matlab project contains the source code and Matlab examples used for string2hash. This function generates a hash value from a text string     hash=string2hash(str,type);     inputs,     str : The text string, or array with text strings.

Sha algorithms 160,224,256,384.512 in matlab

The following Matlab project contains the source code and Matlab examples used for sha algorithms 160,224,256,384.512. Generates Message Digest using algorithms : SHA160, SHA-224, SHA256,SHA384,SHA512             Support for Bit Oriented Message             -- Enter Message Length in Bits             -- Either enter Message (HEX) or             -- generate a random message of length LEN in Bits             -- Select the Algorithm to generate MESG DIGEST                                LEN :: Enter Bit Oriented Message Length                     should be GT 0  

Hmac hash message authentication code function in matlab

The following Matlab project contains the source code and Matlab examples used for hmac hash message authentication code function. HMAC(key,message,method) INPUT key: input secret key in char message: input message in char method: hash method, either:           'SHA-1', 'SHA-256', 'SHA-384', 'SHA-512' OUTPUT HMAC: Hash message authentication code value in upper case HEX.
Subscribe to RSS - Cryptographic hash functions