Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - hash
Search - hash - List
DL : 0
信息安全MD5哈西加密算法用c语言编程实现-information security encryption algorithm MD5 hash using C language programming
Date : 2008-10-13 Size : 6.14kb User : 路程

DL : 0
VB md5的HASH算法 适合与RSA一块使用 -VB md5 HASH the RSA algorithm with a suitable use
Date : 2008-10-13 Size : 2.8kb User : chenyun

DL : 0
雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能快的完成,利用雜湊法是最適當不過了。因為雜湊表搜尋在沒有碰撞(collision)及溢位(overflow)的情況下,只要一次就可擷取到。
Date : 2008-10-13 Size : 11.41kb User : 張建良

介绍Hash算法,VC源代码,着是一个精点的酸法。
Date : 2008-10-13 Size : 27.66kb User : aa

DL : 0
It verifies or generates a signature using the md5 algorithm.
Date : 2008-10-13 Size : 75.8kb User : lena

DL : 0
信息安全MD5哈西加密算法用c语言编程实现-information security encryption algorithm MD5 hash using C language programming
Date : 2025-12-30 Size : 6kb User : 路程

DL : 0
VB md5的HASH算法 适合与RSA一块使用 -VB md5 HASH the RSA algorithm with a suitable use
Date : 2025-12-30 Size : 3kb User : chenyun

DL : 0
雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能快的完成,利用雜湊法是最適當不過了。因為雜湊表搜尋在沒有碰撞(collision)及溢位(overflow)的情況下,只要一次就可擷取到。-Hash method (Hashing) search and general search method (searching) is not the same. In the hash law, the key (key value) or identifier (identifier) address in memory by the function (function) derived from the conversion. Such a function, commonly known as hash function (Hashing function) or key corresponds to the address converter (key to address transformation). For a limited storage space, can be used effectively and in time to add or delete can be completed faster, the use of hash is the most appropriate of all. Because the hash table search in the absence of a collision (collision) and overflow (overflow) circumstances, as long as one can be retrieved.
Date : 2025-12-30 Size : 35kb User : 張建良

DL : 0
加密函数库:包括多种加密\解密算法,数字签名,散列算法-Encryption library: including a variety of encryption and decryption algorithms, digital signatures, hash algorithm
Date : 2025-12-30 Size : 810kb User : 刘志

DL : 0
实现密码算法里的sha-1功能对数据进行加密过程当中进行哈希-The realization of cryptographic algorithm in the sha-1 function to encrypt data to carry out the process of hash
Date : 2025-12-30 Size : 216kb User : abc

介绍Hash算法,VC源代码,着是一个精点的酸法。-Hash algorithm introduced, VC source code, with a fine point acid.
Date : 2025-12-30 Size : 27kb User : aa

DL : 0
It verifies or generates a signature using the md5 algorithm.
Date : 2025-12-30 Size : 76kb User : lena

DL : 0
sah-1(Secure Hash Algorithm,安全散列算法)算法源程序-the c sourse code for sha-1(Secure Hash Algorithm) Algorithm
Date : 2025-12-30 Size : 2kb User : hehailian

DL : 0
哈希签名与验证,代码编写模拟实现,运行需要安装openssl,并进行各种库文件安全证书的导入-Hash signature and verification, coding to achieve simulation run need to install openssl, and conduct a variety of library security certificate import
Date : 2025-12-30 Size : 1.28mb User : 李维

DL : 0
The hash algorithm made by anhmafia
Date : 2025-12-30 Size : 41kb User : anhmafia

DL : 0
这段代码对任意文件生成hash,并保留在txt文本中。-The code to generate the hash for any file, and retained in the txt text.
Date : 2025-12-30 Size : 3.43mb User : 李俊中

hash and mac algorithms are used for the confidentiality and integration of data sent over the network by sender to the receiver.
Date : 2025-12-30 Size : 331kb User : ranjeetkaur

DL : 0
散列算法,用于生成原始消息的数字指纹,本算发基于MATLAB编写,本算法包含多种流行的散列算法,包括SHA1和SHA-256等广泛应用的散列算法,通过本程序,可以对几种广泛应用的散列算法进行调用-Hash algorithm used to generate the digital fingerprint of the original message, this is based on MATLAB, this algorithm contains a variety of popular hash algorithm, including SHA1 and SHA- 256 hash algorithm is widely used, through this program, several widely used hash algorithms can be invoked
Date : 2025-12-30 Size : 1kb User : 奥巴马

DL : 0
hash算法的几种C语言实现,以及源代码,比较简单的代码-Several hash algorithm C language, as well as source code, relatively simple code
Date : 2025-12-30 Size : 1kb User : 程科

很好的MFC下的哈希算法,能加密解密文本文件。-Good hash algorithm under MFC, can decrypt the encrypted text file.
Date : 2025-12-30 Size : 34.64mb User : 徐进
« 12 3 4 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.