Secure Hash Algorithm (SHA) More...
Modules | |
| Macros | |
| Enums | |
| Structures | |
| Functions | |
Secure Hash Algorithm (SHA)
SHA generates an almost-unique 256-bit/384-bit/512-bit signature for a text. The applications of SHA include hash tables, integrity verification, challenge handshake authentication, digital signatures, etc.