Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - hash function
Search - hash function - List
哈希函数的使用,System.Collections.Hashtable 的例子-hash function, examples System.Collections.Hashtable
Date : 2008-10-13 Size : 9.55kb User : 杨微

哈希函数的使用,System.Collections.Hashtable 的例子-hash function, examples System.Collections.Hashtable
Date : 2025-12-16 Size : 32kb User : 杨微

DL : 0
sha-1 哈希函数的c++算法的实现,这是我以前参与的论文,请参考。-sha-1 hash function of the c++ algorithm, which is involved in my previous paper, please refer to.
Date : 2025-12-16 Size : 156kb User : 孙翰墨

DL : 0
假设哈希函数是完美的,即可以把输入数据均匀的分散在哈希表上。 哈希表大小为H,插入数据数量为K,求哈希表的冲突率,要推导过程。 具体一下:假设有20W待插入数据,Hash表大小为60W,求hash表的冲突率。-Suppose the hash function is perfect, that is, input data can be uniformly dispersed in the hash table. Hash table size H, insert the data quantity K, the rate of conflict in order to hash table should be derivation. Specifically this: assuming that there is 20W data to be inserted, Hash table size is 60W, the conflict in order to hash table rates.
Date : 2025-12-16 Size : 155kb User :

DL : 0
任何的mac算法都可以使用标准的hash功能,比如MD5或者sha-1,这种情况下,强度取决于hash功能,和最后的结果的比特串。密匙是关键。-HMAC is a message authentication code (MAC) and can be used to verify the integrity and authentication of a message. It involves hashing a message with a secret key. As with any MAC, it can be used with standard hash function, such as MD5 or SHA-1, which results in methods such as HMAC-MD5 or HMAC-SHA-1. As with any hashing function, the strength depends on the quality of the hashing function, and the resulting number of code bits. Along with this the number of bits in the secret key is a factor.
Date : 2025-12-16 Size : 1kb User : Vincent

DL : 0
用对称加密算法和MD5散列函数实现加解密-With a symmetric encryption algorithm and MD5 hash function to achieve encryption and decryption
Date : 2025-12-16 Size : 11kb User : zhengtianjiao

DL : 0
c#调用SQL存储过程进行用户注册及登录功能的封装类。代码中包含了c#封装代码和对应的存储过程代码。使用哈希函数对密码进行加密。-c# calling SQL stored procedures to encapsulate class user registration and login functions. C# code contains the package code and the corresponding stored procedure code. Using a hash function to encrypt passwords.
Date : 2025-12-16 Size : 1kb User : Jason

DL : 0
本文档是解释了防伪码的生成,其中主要利用了随机数函数和哈希函数-Security code generated by the random number function and the hash function
Date : 2025-12-16 Size : 40kb User : 肖馥楦

DL : 0
散列表(Hash table,也叫哈希表),是根据关键码值(Key value)而直接进行访问的数据结构。也就是说,它通过把关键码值映射到表中一个位置来访问记录,以加快查找的速度。这个映射函数叫做散列函数,存放记录的数组叫做散列表。 给定表M,存在函数f(key),对任意给定的关键字值key,代入函数后若能得到包含该关键字的记录在表中的地址,则称表M为哈希(Hash)表,函数f(key)为哈希(Hash) 函数。-Hash (Hash table, also called a hash table), based on key values ​ ​ (Key value) and direct access to the data structure. In other words, it is to access records by key value mapped to a table in a position to accelerate the lookup speed. This mapping function called a hash function to store the recorded array called a hash table. Given Table M, the presence of the function f (key), for any given key value key, if obtained after substituting function records containing that keyword address in the table, called a hash table M (Hash) table, the function f (key) for the hash (Hash) function.
Date : 2025-12-16 Size : 469kb User : ANDY
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.