CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - hash function
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - hash function - List
[
CA auth
]
Hash
DL : 0
雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能快的完成,利用雜湊法是最適當不過了。因為雜湊表搜尋在沒有碰撞(collision)及溢位(overflow)的情況下,只要一次就可擷取到。
Date
: 2008-10-13
Size
: 11.41kb
User
:
張建良
[
CA auth
]
Hash
DL : 0
雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能快的完成,利用雜湊法是最適當不過了。因為雜湊表搜尋在沒有碰撞(collision)及溢位(overflow)的情況下,只要一次就可擷取到。-Hash method (Hashing) search and general search method (searching) is not the same. In the hash law, the key (key value) or identifier (identifier) address in memory by the function (function) derived from the conversion. Such a function, commonly known as hash function (Hashing function) or key corresponds to the address converter (key to address transformation). For a limited storage space, can be used effectively and in time to add or delete can be completed faster, the use of hash is the most appropriate of all. Because the hash table search in the absence of a collision (collision) and overflow (overflow) circumstances, as long as one can be retrieved.
Date
: 2025-12-16
Size
: 35kb
User
:
張建良
[
CA auth
]
sha1
DL : 0
实现密码算法里的sha-1功能对数据进行加密过程当中进行哈希-The realization of cryptographic algorithm in the sha-1 function to encrypt data to carry out the process of hash
Date
: 2025-12-16
Size
: 216kb
User
:
abc
[
CA auth
]
adaptendian-md4
DL : 0
计算机芯片不同其大小印第安序不同,一般分为大印第安序和小印第安序,如果不能自动区别,用于签名验证的hash函数结果不一样,不能验证-Indian computer chip the size of the different sequence of different, generally divided into large and small Indian Indian sequence order, if the distinction does not automatically used for signature verification of the hash function is not the same as the results can not be verified
Date
: 2025-12-16
Size
: 2kb
User
:
yhl
[
CA auth
]
adaptendian-sha1
DL : 0
计算机芯片不同其大小印第安序不同,一般分为大印第安序和小印第安序,如果不能自动区别,用于签名验证的hash函数结果不一样,不能验证-Indian computer chip the size of the different sequence of different, generally divided into large and small Indian Indian sequence order, if the distinction does not automatically used for signature verification of the hash function is not the same as the results can not be verified
Date
: 2025-12-16
Size
: 4kb
User
:
yhl
[
CA auth
]
beecrypt-4.1.2.tar
DL : 0
是一个正在进行的项目,提供强有力的和快速的加密形式的工具包使用的商业和开放源代码项目。库包括:随机数生成器,分组密码,散列函数,消息认证码-Is an ongoing project to provide a strong and fast encryption tool kit used in the form of commercial and open source projects. Library include: random number generator, block cipher, hash function, message authentication code
Date
: 2025-12-16
Size
: 756kb
User
:
sportsboy_21
[
CA auth
]
shacal
DL : 0
Algoritm SHACAL-2 Block simmetric shiper vitch hash function good algoritm best of the simmetric algorim shiper
Date
: 2025-12-16
Size
: 165kb
User
:
Oleksandr Grechko
[
CA auth
]
sha1
DL : 0
In cryptography, SHA-1 is a cryptographic hash function designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm.
Date
: 2025-12-16
Size
: 11kb
User
:
Santine
[
CA auth
]
sha1
DL : 0
哈希函数加解密图片代码《喜欢的朋友下载吧,下完就能用的-Encryption and decryption picture code " hash function like friends download is finished will be able to use
Date
: 2025-12-16
Size
: 459kb
User
:
LIYAN
[
CA auth
]
haxihanshu-SHA-1suanfa
DL : 0
哈希函数SHA-1的c实现,能正常运行。很实用,适合用来学习sha-1,希望对你有帮助。-A hash function is SHA-1 (c) achieve normal operation. Very practical, ideal for learning the sha-1, you want to help.
Date
: 2025-12-16
Size
: 171kb
User
:
杨俊明
[
CA auth
]
HashMD5
DL : 0
实现hashmd5功能的杂凑算法,广泛应用身份认证、签名认证等。-Realizing the function of hashmd5 hash algorithm, which are widely used authentication, signature, authentication, etc.
Date
: 2025-12-16
Size
: 36kb
User
:
ucps
[
CA auth
]
SHA1Tool
DL : 0
SHA-1 is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST
Date
: 2025-12-16
Size
: 806kb
User
:
kkj
[
CA auth
]
md5
DL : 1
通过实现数字签名算法(DSA),加深对数字签名算法的理解,同时学习Hash算法的实现。 1)利用C\C++语言实现DSA算法。 2)DSA中的Hash函数采用SHA算法。 -By implementing the Digital Signature Algorithm (DSA), a better understanding of the digital signature algorithm, while learning to achieve Hash algorithm. 1) using the C \ C++ language DSA algorithms. 2) DSA of the Hash function SHA algorithm.
Date
: 2025-12-16
Size
: 3kb
User
:
查航
[
CA auth
]
4
DL : 0
Cryptographic Hash Functions: A cryptographic hash function must have at least two security properties: collision free and Hiding. Collision free property ensures that for a given function H, no one can find x and y such that H(x) = H(y). The hiding Property encures that Given H(x), it is infeasible to find x.
Date
: 2025-12-16
Size
: 1kb
User
:
jitender grover
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.