CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - hash
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - hash - List
[
Exploit
]
keyed-md5
DL : 0
该加密算法是采用keyed MD5实现128位散列值,主要应用于MobileIP中的身份认证-The encryption algorithm is used to achieve keyed MD5 hash value of 128, which are mainly used within the Identity Authentication
Date
: 2008-10-13
Size
: 184.26kb
User
:
黄杰
[
Exploit
]
Hash2131
DL : 0
1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -1) understanding hash functions in network security applications (2) master Hash Function Principle 2 require (1) using any programming language to achieve complete hash of functionality (2) the importation of any eight-byte (64 spaces) data, draw the corresponding eight hash code (Abstract)
Date
: 2008-10-13
Size
: 28.35kb
User
:
dreamwhere
[
Exploit
]
SY0606704
DL : 0
传统Hash编码算法SHA-1的具体实现,输入一个字符串,输出其SHA-1编码值
Date
: 2008-10-13
Size
: 83.18kb
User
:
王东
[
Exploit
]
md5-converter
DL : 0
MD5 Hash Konverter. It s good for security you can us it in your script to save your text what you have right or somth. like this sory for this shit text but i cant good english
Date
: 2025-12-30
Size
: 69kb
User
:
penis
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.