CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - hash
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - hash - List
[
CA auth
]
MyMD5
DL : 0
信息安全MD5哈西加密算法用c语言编程实现-information security encryption algorithm MD5 hash using C language programming
Date
: 2008-10-13
Size
: 6.14kb
User
:
路程
[
CA auth
]
MD5hash
DL : 0
VB md5的HASH算法 适合与RSA一块使用 -VB md5 HASH the RSA algorithm with a suitable use
Date
: 2008-10-13
Size
: 2.8kb
User
:
chenyun
[
CA auth
]
Hash
DL : 0
雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能快的完成,利用雜湊法是最適當不過了。因為雜湊表搜尋在沒有碰撞(collision)及溢位(overflow)的情況下,只要一次就可擷取到。
Date
: 2008-10-13
Size
: 11.41kb
User
:
張建良
[
CA auth
]
GetCRC32(VC)
DL : 0
介绍Hash算法,VC源代码,着是一个精点的酸法。
Date
: 2008-10-13
Size
: 27.66kb
User
:
aa
[
CA auth
]
hash
DL : 0
It verifies or generates a signature using the md5 algorithm.
Date
: 2008-10-13
Size
: 75.8kb
User
:
lena
[
CA auth
]
MyMD5
DL : 0
信息安全MD5哈西加密算法用c语言编程实现-information security encryption algorithm MD5 hash using C language programming
Date
: 2025-12-30
Size
: 6kb
User
:
路程
[
CA auth
]
MD5hash
DL : 0
VB md5的HASH算法 适合与RSA一块使用 -VB md5 HASH the RSA algorithm with a suitable use
Date
: 2025-12-30
Size
: 3kb
User
:
chenyun
[
CA auth
]
Hash
DL : 0
雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能快的完成,利用雜湊法是最適當不過了。因為雜湊表搜尋在沒有碰撞(collision)及溢位(overflow)的情況下,只要一次就可擷取到。-Hash method (Hashing) search and general search method (searching) is not the same. In the hash law, the key (key value) or identifier (identifier) address in memory by the function (function) derived from the conversion. Such a function, commonly known as hash function (Hashing function) or key corresponds to the address converter (key to address transformation). For a limited storage space, can be used effectively and in time to add or delete can be completed faster, the use of hash is the most appropriate of all. Because the hash table search in the absence of a collision (collision) and overflow (overflow) circumstances, as long as one can be retrieved.
Date
: 2025-12-30
Size
: 35kb
User
:
張建良
[
CA auth
]
cryptoAPI
DL : 0
加密函数库:包括多种加密\解密算法,数字签名,散列算法-Encryption library: including a variety of encryption and decryption algorithms, digital signatures, hash algorithm
Date
: 2025-12-30
Size
: 810kb
User
:
刘志
[
CA auth
]
sha1
DL : 0
实现密码算法里的sha-1功能对数据进行加密过程当中进行哈希-The realization of cryptographic algorithm in the sha-1 function to encrypt data to carry out the process of hash
Date
: 2025-12-30
Size
: 216kb
User
:
abc
[
CA auth
]
GetCRC32(VC)
DL : 0
介绍Hash算法,VC源代码,着是一个精点的酸法。-Hash algorithm introduced, VC source code, with a fine point acid.
Date
: 2025-12-30
Size
: 27kb
User
:
aa
[
CA auth
]
hash
DL : 0
It verifies or generates a signature using the md5 algorithm.
Date
: 2025-12-30
Size
: 76kb
User
:
lena
[
CA auth
]
sha-1
DL : 0
sah-1(Secure Hash Algorithm,安全散列算法)算法源程序-the c sourse code for sha-1(Secure Hash Algorithm) Algorithm
Date
: 2025-12-30
Size
: 2kb
User
:
hehailian
[
CA auth
]
hash
DL : 0
哈希签名与验证,代码编写模拟实现,运行需要安装openssl,并进行各种库文件安全证书的导入-Hash signature and verification, coding to achieve simulation run need to install openssl, and conduct a variety of library security certificate import
Date
: 2025-12-30
Size
: 1.28mb
User
:
李维
[
CA auth
]
Hash
DL : 0
The hash algorithm made by anhmafia
Date
: 2025-12-30
Size
: 41kb
User
:
anhmafia
[
CA auth
]
hash
DL : 0
这段代码对任意文件生成hash,并保留在txt文本中。-The code to generate the hash for any file, and retained in the txt text.
Date
: 2025-12-30
Size
: 3.43mb
User
:
李俊中
[
CA auth
]
Hash-a-Mac-Algorithm
DL : 0
hash and mac algorithms are used for the confidentiality and integration of data sent over the network by sender to the receiver.
Date
: 2025-12-30
Size
: 331kb
User
:
ranjeetkaur
[
CA auth
]
hash
DL : 0
散列算法,用于生成原始消息的数字指纹,本算发基于MATLAB编写,本算法包含多种流行的散列算法,包括SHA1和SHA-256等广泛应用的散列算法,通过本程序,可以对几种广泛应用的散列算法进行调用-Hash algorithm used to generate the digital fingerprint of the original message, this is based on MATLAB, this algorithm contains a variety of popular hash algorithm, including SHA1 and SHA- 256 hash algorithm is widely used, through this program, several widely used hash algorithms can be invoked
Date
: 2025-12-30
Size
: 1kb
User
:
奥巴马
[
CA auth
]
Hash
DL : 0
hash算法的几种C语言实现,以及源代码,比较简单的代码-Several hash algorithm C language, as well as source code, relatively simple code
Date
: 2025-12-30
Size
: 1kb
User
:
程科
[
CA auth
]
HASH-list-code
DL : 0
很好的MFC下的哈希算法,能加密解密文本文件。-Good hash algorithm under MFC, can decrypt the encrypted text file.
Date
: 2025-12-30
Size
: 34.64mb
User
:
徐进
«
1
2
3
4
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.