Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - hash
Search - hash - List
DL : 0
技术说明,还有RSA算法、HASH算法、MD5、sha1RSA等的C源码.-technical note, RSA algorithm, hash algorithm, MD5, sha1RSA the C source.
Date : 2025-12-29 Size : 89kb User : 彭明

哈希表讲义 -Hash Table lectures Hash Table lectures
Date : 2025-12-29 Size : 21kb User : dd

DL : 0
平衡二叉树操作的演示-balanced binary tree operation of the Demonstration
Date : 2025-12-29 Size : 39kb User :

DL : 0
NTLM挑战模式散列认证加密协议过程,算法实现与一些想法-challenges NTLM hash authenticated encryption mode of the agreement process, algorithm and some thoughts
Date : 2025-12-29 Size : 13kb User : loveangel

DL : 0
次报告详细的解释了如何把全班同学的学号哈希到一张表上。程序简洁明了。-Report detailed explanation of how the whole class to the school No. 1 hash table. Concise procedures.
Date : 2025-12-29 Size : 137kb User : 缪巍巍

DL : 0
这是一篇基于Hash函数敏感性的医学图像精确认证.本文提出了一种基于提升格式的整数小波变换和Hash函数敏感性相结合的易碎水印方法-This is a Hash Function Based on the sensitivity of the medical image accurate authentication. In this paper, a lifting scheme based on integer wavelet transform and Hash function that combines the sensitivity of fragile watermarking method
Date : 2025-12-29 Size : 602kb User : hj

DL : 0
基于Hash函数的TIN拓扑关系重建,Hash函数的构造方法,基于Hash函数的TIN拓扑关系重建算法-Hash function based on the relationship between TIN topology reconstruction, Hash function construction method, based on the Hash function reconstruction algorithm TIN topological relations
Date : 2025-12-29 Size : 315kb User : 李叶林

DL : 0
RSA也可以用来为一个消息署名。假如甲想给乙传递一个署名的消息的话,那么她可以为她的消息计算一个散列值,然后用她的密钥加密这个散列值并将这个“署名”加在消息的后面。这个消息只有用她的公钥才能被解密。乙获得这个消息后可以用甲的公钥解密这个散列值,然后将这个数据与他自己为这个消息计算的散列值相比较。假如两者相符的话,那么他就可以知道发信人持有甲的密钥,以及这个消息在传播路径上没有被篡改过。-RSA can also be used as a signed message. If i want to give B send a signed message, then she can for her calculation of a message hash value, and then use her key encryption of the hash value and the " signed" the message added to the back. This message is only used her public key can be decrypted. B received the news with a public key can decrypt the hash value, then this data with his own message for the hash value calculated in comparison. If the two match, then the sender to know him a key holder, as well as in the dissemination of this message on the path had not been tampered with.
Date : 2025-12-29 Size : 22kb User : 吴成刚

DL : 0
这个是用c实现的,用散列表实现电话查询,是个课程设计-Hash table implementation by telephone
Date : 2025-12-29 Size : 2kb User : 柯幽

介绍了一种新的语义哈希算法,谱哈希的方法,希望有用-Introduces a new semantic hash algorithms, spectral hash, in the hope helpful
Date : 2025-12-29 Size : 928kb User : 柳絮

secure hash 标准文档,包括sha1,sha256,sha512-secure hash standard, sha1,sha256,sha512
Date : 2025-12-29 Size : 175kb User : mickey

DL : 0
哈希表是什么,如何构造一个哈希函数,处理冲突的方式以及哈希表的查找及分析。(What a hash table is, how to construct a hash function, the way it handles conflicts, and the lookup and analysis of hashes.)
Date : 2025-12-29 Size : 355kb User : tony1030

全面讲述数据结构中的链表、树、图等多种数据结构,包括哈希表、哈希树等,每一个PPT均详尽严谨,是不可多得的数据结构教材。(A comprehensive description of the data structure of the linked list, tree, graph and other data structures, including hash table, hash tree, etc., each PPT are detailed and rigorous, is a rare data structure textbook.)
Date : 2025-12-29 Size : 5.02mb User : pdzl
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.