Secure Hash Algorithm (SHA) More...
Modules | |
Macros | |
Enums | |
Structures | |
Functions | |
Secure Hash Algorithm (SHA)
SHA generates an almost-unique 256-bit/384-bit/512-bit signature for a text. The applications of SHA include hash tables, integrity verification, challenge handshake authentication, digital signatures, etc.