Welcome![Sign In][Sign Up]
Location:
Search - calculate hash

Search list

[File OperateFileVerifier

Description: FileVerifier++是一款Windows功能软件,它用于计算文件的hash值(算法包括:CRC32,MD5,SHA-1,SHA-256/224/384/512,WHIRLPOOL,以及RIPEMD-128/160/256/320)。支持的hash文件格式包括MD5SUM .MD5, SFV, BSD CKSUM, 以及其他格式。-FileVerifier++ Software is a Windows feature, it used to calculate the hash value of files (including algorithms: CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, as well as RIPEMD-128/160/256/320). Hash file format support including MD5SUM. MD5, SFV, BSD CKSUM, as well as other formats.
Platform: | Size: 1241088 | Author: bestcode | Hits:

[Windows Developmycrc

Description: command line tool to calculate hash
Platform: | Size: 61440 | Author: LatinLamer | Hits:

[JSP/Javajava_DigitalSign

Description: 实用数字签名的步骤 (1)发送方使用MD5算法对原始信息进行计算,获得一个固定长度的信息摘要 (2)发送方用自己的私钥加密生成的信息生成发送方的数字签名,发送方把这个数字签名作为发送信息的附件和明文信息,一同用接收方的公钥进行加密,将加密后的密文一同发送给接收方; (3)接收方首先把接收到的密文用自己的私钥解密,得到明文信息和数字签名,再用发送方的公钥对数字签名进行解密,然后使用相同的单向散列算法来计算解密得到的明文信息,得到信息摘要;对比计算出来的信息摘要和发送方发送过来的信息摘要是否一致-Practical steps to a digital signature (1) sender MD5 algorithm used to calculate the original information, access to a fixed length message digest (2) use their own sender s private key to generate encrypted information generated by the sender s digital signature, the sender of the digital signature as an annex to send a message and express information, together with the recipient s public key for encryption, will be encrypted ciphertext sent to the receiver together (3) the recipient first received ciphertext with its own private key to decrypt received explicit information and digital signatures, and then the sender s public key to decrypt the digital signature, and then use the same one-way hash algorithm to calculate the explicit information to be decrypted, the message digest contrast calculated message digest and the sender sent the message digest are consistent
Platform: | Size: 23552 | Author: 张云 | Hits:

[Crack Hacksha1-0.2.tar

Description: his a C++ class that implements the Secure Hash Algorithm SHA-1. The purpose of the algorithm is to calculate a strong hash of given bit string. By "strong", we mean that it is very difficult to find a different bit string that results in the same hash. It is similarly difficult, using only the hash, to determine the original bit string. SHA-1 produces a 20 byte (160 bit) hash.-his is a C++ class that implements the Secure Hash Algorithm SHA-1. The purpose of the algorithm is to calculate a strong hash of given bit string. By "strong", we mean that it is very difficult to find a different bit string that results in the same hash. It is similarly difficult, using only the hash, to determine the original bit string. SHA-1 produces a 20 byte (160 bit) hash.
Platform: | Size: 6144 | Author: enropin | Hits:

[Crack Hacksha512

Description: 使用vc实现的高效的sha512算法,并通过测试能正确地计算出任意文件的哈希值,欢迎使用-Vc achieve efficient use of the sha512 algorithm, and passing a test to correctly calculate the hash value of any file, please use the
Platform: | Size: 1400832 | Author: 刘琦 | Hits:

[Crack HackTestSha1

Description: 使用MFC实现的sha1算法,可以高效地计算出任意文件的哈希值,已通过测试,欢迎下载-Using the MFC implementation sha1 algorithm can efficiently calculate the hash value of an arbitrary file, has passed the test, please download the
Platform: | Size: 14155776 | Author: 刘琦 | Hits:

[CSharpMD4C.C__

Description: 这是一个关于md4哈希值转换的函数,可以计算出密码的哈希值-This is a conversion on the md4 hash functions, you can calculate the password hash
Platform: | Size: 3072 | Author: lily | Hits:

[Otherhashtable

Description: calculate the hash based on the matlab
Platform: | Size: 4096 | Author: thirtyfive | Hits:

[JSP/JavaHW6

Description: 用哈希表实现了节点的插入,删除,并计算冲突次数-A hash table implementation of the node insert, delete, and calculate the number of conflicts
Platform: | Size: 9216 | Author: annie | Hits:

[Linux-UnixTPM-SHA1-calculate

Description: 在linux平台,利用模拟TPM构建可信平台,在TDD层掉用模拟可信芯片散列算法计算文件散列值。-In linux platform, built using simulated TPM trusted platform, level off in the TDD chip analog trusted file hash algorithm to calculate the hash value.
Platform: | Size: 2048 | Author: 柳景超 | Hits:

[JSPJAVA-hash-table

Description: (1) 建立一个哈希表,哈希函数为除留余数法,处理冲突的方法为线性探测再散列或二次探测再散列。 (2) 往哈希表中依次存入插入多个单词。 (3) 显示哈希表的存储情况。 (4) 计算哈希表的平均查找长度。 (5) 程序模块化设计。 -(1) the establishment of a hash table, a hash function other than stay the remainder method, the method of dealing with conflict, linear probing hash or quadratic probing hash. (2) to the hash table is sequentially stored into the multiple words. (3) the storage of the hash table. (4) Calculate the average length of the hash table. (5) The program modular design.
Platform: | Size: 34816 | Author: 王雪 | Hits:

[.netcrc

Description: Code for calculating crc of the file. This code is for c++ and can calculate hash of any file. Could be useful in disk or antivirus programms
Platform: | Size: 2048 | Author: NiggaBitch | Hits:

[Proxy ServerSHA_256-511120337292002

Description: These are the profesional routines to calculate HASH TABLE values. You can use them to calculate digital signatures for instance.
Platform: | Size: 23552 | Author: aida | Hits:

[CSharpHash

Description: 读取两个文件中的内容,并识别关键字统计关键字的个数,利用哈希表的开放地址发和链地址法进行保存,并计算两个文件的差异性大小,输出用两种方法进行哈希表计算的效率比较。-Read the contents of the two files, and identifies the number of keyword statistics keyword, use an open address hash table address method development and chains to save, and calculate the difference between the size of the two files, the output of two ways hash table to calculate the efficiency of the comparison.
Platform: | Size: 6144 | Author: kiki | Hits:

[OtherHash

Description: 哈希表的操作基本功能如下: (1)生成n个随机数并输出。 (2)确定适当的哈希地址空间大小m,使控制装填因子α在0.75左右。 (3)采用除留余数法作为哈希函数 H(key)=key p,选择适当的p。 (4)用开放定址法中线性探查法处理冲突建立哈希表,并计算平均查找长度。 (5)功能:检索、插入、删除。-The basic function of the operation of the hash table as follows: (a) generating a random number, and n outputs. (2) to determine the appropriate size of the hash address space m, the control loading factor α at around 0.75. (3) In addition to leaving the remainder using a hash function H (key) = key p, select the appropriate p. (4) establish conflict hash table with open addressing method in the linear probe method, and calculate the average search length. (5) Function: retrieve, insert, delete.
Platform: | Size: 2048 | Author: | Hits:

[CA authDS_net

Description: ca论证,运用md5算法,加解密文件,计算哈希值等。-ca demonstration, using md5 algorithm, encryption and decryption files, calculate hash values, etc.
Platform: | Size: 212992 | Author: 苦修 | Hits:

[Crack Hackhash

Description: 能在数据库中进行数据查找,并且计算平均查找长度,而且对于重复的数据能够解决冲突-Can be in the to find the data, and calculate the average search length, but also for the repeated data to resolve conflicts
Platform: | Size: 2048 | Author: 侯松 | Hits:

[Linux-Unixbrkeng

Description: Calculate hash of a table entry.
Platform: | Size: 7168 | Author: juizaoti | Hits:

[Compress-Decompress algrithmsHashCodes-md5_sha1_sha256校验器

Description: 用于md5_sha1_sha256校验,可以快速的算出文件的独一无二的特征码。(For md5_sha1_sha256 check, you can quickly calculate the file unique feature code.)
Platform: | Size: 477184 | Author: qq879021308 | Hits:

[Windows Developcloc-1.64.tar

Description: Program to calculate a hash code
Platform: | Size: 101376 | Author: javierde22 | Hits:
« 12 3 »

CodeBus www.codebus.net