CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - hash
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - hash - List
[
VC/MFC
]
GOOD_HASH
DL : 0
一个简单的HASH表的建立与HASH过程演示.-a simple hash table HASH the establishment and demonstration process.
Date
: 2025-12-30
Size
: 1kb
User
:
张新
[
VC/MFC
]
vc.net
DL : 0
第一章:综合运用VC.NET与托管类 第二章: 正则表达式的运用 第三章: 注册表、文件IO 第四章:密码学、HASH代码、数据加密 第五章:XML ADO.NET 第六章: ADO.NET与dataset 第七章:高级ADO.net 第八章:ADO.NET与xml高级运用 第九章:远程处理 第十章:事件日志、进程控制、性能测试 第十一章:管理托管对象 -Chapter I: the integrated use of VC.NET with the Managed Classes chapter: the use of regular expressions in Chapter III: registry, file IO Chapter IV: Cryptography, HASH code, data encryption Chapter V: XML ADO.NET Article six chapters: ADO.NET and dataset Chapter VII: Advanced ADO.Net Chapter VIII: ADO.NET with xml senior use of Chapter IX: Remote handle Chapter X: event logs, process control, performance testing Chapter XI: Management Managed Object
Date
: 2025-12-30
Size
: 17.42mb
User
:
方剑
[
VC/MFC
]
hash
DL : 0
散列表又叫哈希表,它是通过哈希函数来确定数据元素存放位置的一种特殊表结构。程序实现对指定文本文件中的单词进行检索,并可得哈希值-Hash table is also called the hash table, it is through the hash function to determine the location of data elements stored a special table structure. Procedures to achieve the specified text file in a word search, and a hash value
Date
: 2025-12-30
Size
: 4kb
User
:
like
[
VC/MFC
]
MD5
DL : 0
在一些初始化处理后,MD5以512位分组来处理输入文本,每一分组又划分为16个32位子分组。算法的输出由四个32位分组组成,将它们级联形成一个128位散列值。 首先填充消息使其长度恰好为一个比512位的倍数仅小64位的数。填充方法是附一个1在消息后面,后接所要求的多个0,然后在其后附上64位的消息长度(填充前)。这两步的作用是使消息长度恰好是512位的整数倍(算法的其余部分要求如此),同时确保不同的消息在填充后不相同。 四个32位变量初始化为:-After treatment in a number of initialization, MD5 to 512 division to deal with input text, each sub-divided into 16 sub-32 seat. Algorithm output consists of four sub-groups, 32, cascade them to form a 128-bit hash value. First of all, it filled the news for a length of just over 512 in multiples of 64 only a few small. Filling method is attached to the back of a 1 in the message, followed by the required number of 0, and then subsequently attached to the message length of 64 (before filling). The role of these two steps so that messages are exactly the length of integer multiple of 512 (the rest of the algorithm requested the case), while ensuring that the different sources in the same after filling. Four 32-bit variable is initialized as follows:
Date
: 2025-12-30
Size
: 2kb
User
:
修凤志
[
VC/MFC
]
doc1
DL : 0
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data. -This project demonstrates the use of secure hash functions technique to implement a file encryption/decryption system. This implemented application can encrypt/decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
Date
: 2025-12-30
Size
: 194kb
User
:
vara
[
VC/MFC
]
md5
DL : 0
hash算法中常见的一种,md5算法,在vc++中的源代码-hash algorithm is a common, md5 algorithm, vc++ at the source code
Date
: 2025-12-30
Size
: 4kb
User
:
徐蕾
[
VC/MFC
]
Cpp_expert_talking
DL : 0
1 auto_ptr再回忆 2 空引用 3 起源 4 谁的代码更易于移植? 5 通过任何其他名字 6 Virtually Yours 7 方形尖塔 8 访问限制 9 重定向 10 关于操纵器的对话 11 根源 12 Abstract Factory, Template Style 13 怎样持久化一个对象 14 The Bind That Ties 15 Back to Base-ics 16 Al-Go-Rithms 17 匈牙利命名 18 我为你准备一切 19 新的起点,第一部分 20 新的起点,第二部分 21 模板特化,缺省参数和其他一些有趣的事情 22 想睡觉,偶然 23 产生真正的hash对象 24 好的,坏的,不赞成的 25 Getting to the Point 26 A Midsummer Night’s Madness 27 Baseless Exceptions 28 Contracts, Promises, and Mere Semantics 29 可怜的bool 30 It s an Object-ful Lifetime 另 与大虾对话: 领悟设计模式 -Herb Sutter is chief technology officer of PeerDirect Inc. and secretary of the ISO/ANSI C++ standards committee.
Date
: 2025-12-30
Size
: 139kb
User
:
何子文
[
VC/MFC
]
BoostTechnologyAndApplication
DL : 0
boost和loki是重要的c++库,此文档是侯捷关于boost的最新研究成果,包括boost和loki的一些组件(pool,any,hash等)实现与应用及与stl的比较,有一定难度。-loki is an important boost, and the c++ library, Hou Jie, this document on the boost of the latest research results, including the boost and some of loki component (pool, any, hash, etc.) with the application and comparison with stl There is a certain degree of difficulty.
Date
: 2025-12-30
Size
: 5.46mb
User
:
张秋道
[
VC/MFC
]
webServicetransfer
DL : 0
用C#实现基于WEBService的文件传输程序,Web服务的创建和调用,并WSE3.0、后台线程的创建模式、文件哈希校验等-To use C# to achieve WEBService-based file transfer program, Web services, to create and call, and WSE3.0, background thread creation mode, the file hash check, etc.
Date
: 2025-12-30
Size
: 249kb
User
:
steven
[
VC/MFC
]
the-analysis-of-STL-sourse
DL : 0
本书所呈现的源码,使你踏上了基度山岛。源码之前了无秘密,你将看到vector的实现、list的实现、heap的实现、deque的实现、Red Black tree的实现、hash table的实现、set/map的实现;你将看到各种算法(排序、查找、排列组合、数据移动与复制技术)的实现;你甚至能够看到底层的memory pook和高阶抽象的traits机制的实现。-The source code presented in this book, so that you set foot on the base of Monte island. Prior to the non-secret source code, you will see the vector implementation, list the implementation, heap implementation, deque implementation, Red Black tree implementation, hash table implementation, set/map for implementation you will see the various algorithms (sort, find, permutations and combinations, data movement and replication technology) is achieved you can even see the bottom of memory pook and higher-order abstract traits mechanism for implementation.
Date
: 2025-12-30
Size
: 9.61mb
User
:
祝鹏
[
VC/MFC
]
hash
DL : 0
一个功能较为全面的hash类头文件,用开放地址法和邻接链表法处理冲突,表的大小为大于用户指定大小的最小质数。表本身会自动调整大小-A hash function is more comprehensive class header file, with the opening address of the treatment method and the adjacency lists conflict, the table size is greater than the user-specified size of the smallest prime number. Automatically adjust the size of the table itself
Date
: 2025-12-30
Size
: 3kb
User
:
余杰
[
VC/MFC
]
070712
DL : 0
用哈希表实现的简单位进制判断 简单非常的容易懂,适合初学者借鉴-Achieved with a simple hash table to determine hexadecimal
Date
: 2025-12-30
Size
: 356kb
User
:
李华星
[
VC/MFC
]
Search
DL : 0
此程序为一个完整的哈希查询的实验报告,此报告包含完整的程序代码 步骤 和结果-This program is a complete hash check lab reports, this report contains the complete program code steps and results
Date
: 2025-12-30
Size
: 23kb
User
:
ding
[
VC/MFC
]
Hash
DL : 0
哈希表的实现,按照书上得来,简单易用,可看看。-Hash table implementation, in accordance with the books come, easy to use, can take a look.
Date
: 2025-12-30
Size
: 9kb
User
:
ywwqgreat
[
VC/MFC
]
hashfunction
DL : 0
对32个C语言关键字为完美哈希函数的哈希函数-Keywords of 32 C-perfect hash function for the hash function
Date
: 2025-12-30
Size
: 847kb
User
:
黄少斌
[
VC/MFC
]
Hash
DL : 0
Hash Function for Russian Standart!
Date
: 2025-12-30
Size
: 441kb
User
:
nguyen
[
VC/MFC
]
my-hash
DL : 0
自己实现的hash链表,开发工具是VC++6.0-Own implementation of hash lists, the development tool is VC++6.0
Date
: 2025-12-30
Size
: 7kb
User
:
WangWei
[
VC/MFC
]
AAAAAAA
DL : 0
基于哈希表的词频统计 -Hash table based on word frequency statistics
Date
: 2025-12-30
Size
: 17kb
User
:
sa
[
VC/MFC
]
5-28
DL : 0
全面实现散列存储,包括散列函数的设计、散列表的构造、插入、查找、删除、用开放地址法解决冲突。-Full realization of the hash storage, including the design of hash function, hash table structure, insert, search, delete, open the address method used to resolve conflicts.
Date
: 2025-12-30
Size
: 1kb
User
:
tyq
[
VC/MFC
]
hash
DL : 0
对哈希表的实现 简单易懂 适合初学者 代码编译通过没有错误 详情请看代码-Hash table to the realization of the simple and understandable for beginners code compiler through please see no error code
Date
: 2025-12-30
Size
: 1kb
User
:
戴自春
«
1
2
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.