Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - hash
Search - hash - List
DL : 0
JAVA数据结构之HASH编码的小应用程序-Java data structures hash coding of small applications
Date : 2025-12-30 Size : 7kb User : 张忠良

可用于P2P分布式网络的哈希算法, 带有例子,直接复制出HASH类即可方便使用.-for peer-to-peer distributed network of Hash algorithms, with examples. direct cloning HASH category will be easier to use.
Date : 2025-12-30 Size : 32kb User : 纪灵

pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.
Date : 2025-12-30 Size : 287kb User : ssomsak

program which uses hashing techniques for storing and retrieving the data. Input to the program: Some random numbers. Input will be from a file. Output: First the program reads all the input and store it properly using some hash techniques. Once your program reads the complete input,it waits for the user input (prompt to the user). User now enters some number.program displays if this number exists in the list or not. it also display the time taken in the search operation.
Date : 2025-12-30 Size : 7kb User : Abhiram

calcchecksum用于计算各种hash值,是一个开源软件。-calcchecksum is a tool for calculating various hashes (checksums)
Date : 2025-12-30 Size : 747kb User : shepherd

A hash table that stores key/pointer pairs. The table can handle either numbers or strings as keys, you specify which type it is when you create it. When you use strings as the keys, you should store the key permanently yourself somewhere, such as in the data structure you re pointing to, because the hash table doesn t duplicate the key. For example: Create a struct person that has a name and age, and pass in the name as the key, and the struct pointer as the pointer. -A hash table that stores key/pointer pairs. The table can handle either numbers or strings as keys, you specify which type it is when you create it. When you use strings as the keys, you should store the key permanently yourself somewhere, such as in the data structure you re pointing to, because the hash table doesn t duplicate the key. For example: Create a struct person that has a name and age, and pass in the name as the key, and the struct pointer as the pointer.
Date : 2025-12-30 Size : 7kb User : csp

DL : 0
Visual basic module for generating hash value based on custom hex values.
Date : 2025-12-30 Size : 1kb User : ndowie

DES算法 DSA算法 ElGamal算法 Kohonen的SOFM(自组织特征映射) LAM(线性联想记忆)算法 LZW 压缩算法 MD5算法 PGP的安全性(一) PKCS #7 RSA算法 SSL是怎样工作的? Ternary Search Trees 产生组合的非递归算法 大整数的乘法 对LZW算法的改进及其在图象无损压缩中的应用 复数快速傅立叶变换算法 加密算法与密钥管理 经典加密算法在VB中的实现(1)- Rsa 经典加密算法在VB中的实现(2)- MD5 经典加密算法在VB中的实现(3)- RC4 经典加密算法在VB中的实现(4)- DES 经典字符串HASH函数测试 离散的Hopfield算法 秘密天窗加密方法C++源程序 浅谈图像压缩算法 求全排列的非递归算法 如何实现DES算法 神经元网络 LVQ(学习矢量量化)算法 神经元网络的经典B-P算法1 神经元网络的经典B-P算法2 神经元网络的经典B-P算法3 实数快速fft变换算法 实数快速fft算法二 使用ASP加密算法加密你的数据 手写体数据变换成像素位图的算法 -DES algorithm DSA algorithm ElGamal algorithm Kohonen s SOFM (Self Organizing Map) LAM (Linear Associative Memory) algorithm LZW compression algorithm MD5 Algorithm PGP Security (a) PKCS# 7 RSA algorithm SSL How does it work? Ternary Search Trees Produce combinations of non-recursive algorithm Large integer multiplication On the LZW algorithm and its application in image lossless compression Complex fast Fourier transform algorithm Encryption and Key Management Classical encryption algorithm implementation in VB in (1)- Rsa Classical encryption algorithm implementation in VB in (2)- MD5 Classical encryption algorithm implementation in VB in (3)- RC4 Classical encryption algorithm implementation in VB in (4)- DES Classical string HASH function test Discrete Hopfield algorithm Secret Window encryption C++ source code Of image compression algorithm Perfectionist ordered non-recursive algorithm How to implement DES algorithm Neural network LVQ (learning vector qu
Date : 2025-12-30 Size : 205kb User : 蟲子

DL : 0
已知某哈希表的装载因子小于1,哈希函数 H(key)为关键字(标识符)的第一个字母在字母表中 的序号,处理冲突的方法为线性探测开放定址法。 试编写一个按第一个字母的顺序输出哈希表中所有 关键字的算法。-Known load factor of a hash table is less than 1, the hash function H (key) for the keywords (identifiers) of the first letter of the alphabet in the serial number, dealing with the conflict detection for the linear open addressing method . Try to write a letter by the first order of output of the hash table algorithm for all keywords.
Date : 2025-12-30 Size : 1kb User : CClose

Algorithm Hash Learning Example
Date : 2025-12-30 Size : 1.06mb User : jefry

一个管用的hash算法,对字符串插入与查找很有用 hashtable.cpp hashtable.h-A useful hash algorithm, and search for the string into useful hashtable.cpp hashtable.h
Date : 2025-12-30 Size : 2.13mb User : husq

根据文件的绝对路径和插件的编号,获取文件哈希值。-According to the absolute file path and the number of plug-in, access to the file hash value.
Date : 2025-12-30 Size : 1kb User : steven

哈希算法将任意长度的二进制值映射为固定长度的较小二进制值,这个小的二进制值称为哈希值。哈希值是一段数据唯一且极其紧凑的数值表示形式。如果散列一段明文而且哪怕只更改该段落的一个字母,随后的哈希都将产生不同的值。要找到散列为同一个值的两个不同的输入,在计算上是不可能的,所以数据的哈希值可以检验数据的完整性。-The hash algorithm to map arbitrary length binary value for the smaller binary value of the fixed-length, this small binary value called a hash value. The hash value is unique and extremely compact numerical representation of a piece of data. If the hash a plaintext and even if only to change the letter of the paragraph, followed by the hash will have different values. To find two different input hash for the same value, in the calculation is impossible, so the hash value of the data to test the integrity of the data.
Date : 2025-12-30 Size : 4kb User : w_jmos

各种算法原理 冒泡排序 选择排序 插入排序 堆排序 归并排序 快速排序 二分查找算法 Hash算法-Various algorithms of various algorithms of various algorithms principles principles of various algorithms principle principle
Date : 2025-12-30 Size : 928kb User : 叶江楠

DL : 0
python编写SM3密码杂凑算法,测试字符串abc, abcd*16-written in python SM3 password hash algorithm, the test string abc, abcd.* 16
Date : 2025-12-30 Size : 1kb User : 必须

SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-512 (这些有时候也被称做 SHA-2)。-SHA (Secure Hash Algorithm, translated as Secure Hash Algorithm) is the design of the U.S. National Security Agency (NSA), the U.S. National Institute of Standards and Technology (NIST) released a series of cryptographic hash function. The official name for a member of the SHA family, was released in 1993. However, people now give it an informal name of SHA-0 to avoid confusion with its successor. Two years later, SHA-1, the first SHA successor release. In addition there are four variants, once released in order to enhance the range of the output and change some subtle design: SHA-224, SHA-256, SHA-384 and SHA-512 (these are sometimes called SHA-2).
Date : 2025-12-30 Size : 26kb User : 方东

基于国密算法SM3实现HMAC,输入密钥和消息,可产生HASH验证码,C环境下调试成功-Based on the countries close algorithm realization SM3 HMAC, input key and news, can produce HASH verification code, C environment debugging success
Date : 2025-12-30 Size : 228kb User : 易维兴

剑桥数据库源代码,包括fourier、fred_singular、hash算法等-Cambridge database source code, including Fourier fred_singular hash algorithm
Date : 2025-12-30 Size : 19kb User : sherry

Digital image hash function
Date : 2025-12-30 Size : 77kb User : neha

DL : 0
HASH函数实现//输入输出采用直接在对话框进行的方式 //雪崩测试的改变位数由伪随机数生成 #include<iostream> #include<string.h> #include<stdio.h> #include<conio.h> #include<time.h> using namespace std -hash function
Date : 2025-12-30 Size : 865kb User : hesper
« 12 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.