Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - hash
Search - hash - List
一本关于密码学应用的学习参考书,内有对称密钥加密、数字签名、认证、公钥加密、哈希算法等内容,内容全面。-one on the application of cryptography study reference books, there are symmetric key encryption, digital signature, authentication, public key encryption, Hash algorithms, comprehensive content.
Date : 2025-12-30 Size : 5.33mb User : xiaoyu

DL : 0
非常不错的密码学课件(PPT),共20个文件 1[1].密码学与计算机安全2002-01.ppt 2[1].密码学与计算机安全.ppt 3[1].古典替换密码.ppt 4[1].古典变换密码.ppt 5[1].古典变换密码与乘积密码.ppt 6[1].现代密码学.ppt 7[1].现代分组密码-des.ppt 8[1].数论理论介绍.ppt 9[1].公钥密码学.ppt 10[1].公钥加密算法(续).ppt 11[1].认证、哈希算法.ppt 13[1].数字签名算法.ppt 17[1].ssl协议.rar 18[1].古典替换密码cont.ppt 19[1].可信的计算机系统.ppt 20[1].密钥管理与证书.ppt-very good cryptography Courseware (PPT), A total of 20 documents a [1]. cryptography and computer security 2002- 01.ppt 2 [1]. Cryptography and computer security. ppt 3 [1]. Classical replace passwords. ppt 4 [1]. Classical transform password. 5 ppt [1]. Classical transform the product code and password. ppt 6 [1]. Modern cryptography. ppt 7 [1]. Modern a password-des.ppt 8 [1]. on the number theory. ppt 9 [1]. Public-key cryptography. pp t 10 [1]. Public-key encryption algorithm (continued). ppt 11 [1]. certification, Hash algorithm. ppt 13 [1]. Digital Signature Algorithm. ppt 17 [1]. ssl agreement. rar 1 8 [1]. Classical replace passwords cont.ppt 19 [1]. credible computer system. ppt 20 [ 1]. key management and certificate. ppt
Date : 2025-12-30 Size : 2.95mb User : 孟繁宇

hash函数的工具大全,主要介绍sha算法,内容详尽但需要一定英文基础。-hash function tool Daquan, introduced sha algorithm, as detailed in English but needed basis.
Date : 2025-12-30 Size : 31kb User : 岳云召

SHA Hash algorithm. This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA- 512.
Date : 2025-12-30 Size : 175kb User : pccc

一本关于计算机算法的经典书籍,The art of computer programming Vol.3翻译过来的中文版,主要讲解排序与查找两方面理论的内容,包括内部排序,最优排序,外部排序,顺序查找,数组查找,比较查找,杂凑等方面。并附有习题答案。-A computer algorithm on the classic book, The art of computer programming Vol.3 translated the Chinese version, mainly to sort and search on the theory of two aspects, including the internal order of the best sort, external sorting, the order of search, the array to find compare the search, hash and so on. Exercises with the answer.
Date : 2025-12-30 Size : 16.01mb User : 李元柳

Linux Kernel Hash Table Behavior Analysis and Improvements
Date : 2025-12-30 Size : 84kb User : 刘小小

数据结构C.语言描述.应用标准摸板库STL第2版阐述了对象设计和编程原理;开发清晰的模板,针对每个STL容器提供了API;介绍了迭代器;详细讲述了红黑树、哈希表、堆和图表。-C. language to describe the data structure. Application of the standard template library STL version 2 describes the object design and programming principles development of a clear template, for each STL container provides the API introduced iterator detailed account of the red-black tree , hash tables, heap and charts.
Date : 2025-12-30 Size : 20.22mb User : 品牌

DL : 0
Introduction 2. Basic C, Operations, Types, Storage Classes 3. Functions, Preprocessor 4. Input/Output, File Input/Output Section 2: Data Structures in C 1. Pointers 2. Arrays 3. Dynamic Memory Allocation 4. Strings 5. Structures 6. Linked Lists, Trees, Hash Tables Section 3: Appendix 1. Make and Makefiles 2. Debugging Techniques 3. Creating Libraries 4. Programming Tips and Tricks
Date : 2025-12-30 Size : 109kb User : venkata ramana

Hash Functions Based on Block Ciphers and Modular Arithmetic Bart Preneel Katholieke Universiteit Leuven bartDOTpreneel(AT)esatDOTkuleuvenDOTbe http://homes.esat.kuleuven.be/∼ preneel-Hash Functions Based on Block Ciphers and Modular Arithmetic Bart Preneel Katholieke Universiteit Leuven bartDOTpreneel (AT) esatDOTkuleuvenDOTbe http://homes.esat.kuleuven.be/ ~ preneel
Date : 2025-12-30 Size : 110kb User : wxd

讲的是传递哈希密码攻击,英文的大家自己研究吧,总体说还可以,能够了解密码学的-Pass-the-hash attacks: Tools and Mitigation Although pass-the-hash attacks have been around for a little over thirteen years, the knowledge of its existence is still poor. This paper tries to fill a gap in the knowledge of this attack through the testing of the freely available tools that facilitate the attack. While other papers and resources focus primarily on running the tools and sometimes comparing them, this paper offers an in-depth, systematic comparison of the tools across the various Windows platforms, including AV detection rates. It also provides exte...
Date : 2025-12-30 Size : 1.75mb User : 贺中华

DL : 0
本书以生动的语言和丰富的代码示例,运用一些相对简单的例子分析开发系统程序中可能遇到的各种问题。作者把数年的开发经验和阅读大量书籍的体会,结合他在培训新员工过程中所积累的培养方法,融会贯通在这12 章的内容中。书中介绍了链表、数组、栈、队列和散列表等基础数据结构,也介绍了并发、同步和内存管理等系统程序中常需注意的问题,还讲解了文本处理器等具体应用程序的设计方法。本书是初涉系统程序开发领域的人不可多得的一本参考书。书中体现的思想对于其他各种软件开发人员、相关专业的在校学生以及软件开发爱好者都有启发意义。-The book s vivid language and rich code examples, the use of some relatively simple example of a program development system may encounter various problems. The number of years of development experience and the experience of reading a lot of books, combined with his training new employees in the course of the accumulation of training methods, mastery in the context of Chapter 12. The book describes the linked list, arrays, stacks, queues, and hash tables and other basic data structures, but also introduces the concurrency, synchronization and memory management, system programs often need to pay attention to the problem, but also to explain the text processor and other specific design applications . Book are new to the area of program development systems were rare a reference book. The book reflects the thinking of software developers for a variety of other, related professional school students, and software development enthusiasts are instructive.
Date : 2025-12-30 Size : 1.33mb User : storm_knight

DL : 0
介绍高精度DEM生成的方法,具有非常大的创新性-Introduce high-precision DEM generation method, has a very innovative
Date : 2025-12-30 Size : 81kb User : zsddds

音频感知哈希算法研究,感知哈希 音频 语音 多媒体内容认证 性能评价 压缩域算法-The audio perception hash algorithm
Date : 2025-12-30 Size : 4.24mb User : tqy

介绍搜图原理的一个简单实现。通过感知哈希算法来对一个图片生成一个“指纹”,进而对本站所有图片可以根据“指纹”来寻找-A simple implementation introduced ccnphoto principle. Perceptual hashing algorithm to generate a " fingerprint" of a picture, and then all the pictures of the site to find the " fingerprint"
Date : 2025-12-30 Size : 4kb User : tqy

We describe the design and C++ implementation of the newly created memory module (MM) in this work. It will be used in the GIMPLE Model Checker, an explicit state model checker, to represent the memory of checked program. MM differs from other code model checkers in the fact, that it stores ordinary C++ objects fulfilling a given interface as values. This allows to store, e.g., value data together with its type, a symbolic value used in a symbolic execution or a predicate over a stored value used in predicate abstraction. MM uses delta saving, incremental hashing and incremental heap canonicalization to save the state, canonicalize the heap and compute the hash of the state efficiently.
Date : 2025-12-30 Size : 509kb User : topper1010

DL : 0
perl编程 第1学时 Perl 入门 第2学时 Perl 的基本构件:数字和字符串 第3学时 控制程序流 第4学时 基本构件的堆栈:列表与数组 第5学时 进行文件操作 第6学时 模式匹配 第7学时 哈希结构 第8学时 函数-perl programming 1 hours Perl entry 2 hours Perl basic components: numbers and strings 3 hours to control program flow Stack: a list of the array of the basic building blocks of the first 4 hours 5 hours of file operations Pattern matching 6 hours 7 hours hash structure Function of 8 hours
Date : 2025-12-30 Size : 7.45mb User : 何松

DL : 0
个人整理资料,该文档详细说明了宏定义中的#和##(井号双井号)的用法希望对大家有所帮助-Personal collating information, the document details the macro definition# and## (pound sign double hash) usage we hope to help
Date : 2025-12-30 Size : 2kb User : 阿莱克

DL : 0
现代密码学教程》是一本关于现代密码学的基础教材。全书共分11章和1个附录(参考文献),主要分成4部分。第1部分(第1~3章)主要介绍现代密码学的基础知识,包括密码学的基本概念、基本体制、基本思想以及所用到的理论知识等。第2部分(第4~7章)主要介绍现代密码学的基本技术,包括对称密码技术(分组密码、序列密码)、Hash函数、公钥密码技术等。第3部分(第8~10章)主要介绍现代密码学的基本应用,包括数字签名技术、密钥管理、密码协议等。第4部分(第11章)对现代密码学的今后发展进行了展望。-Modern Cryptography Course " is a book about modern cryptography based materials. The book is divided into 11 chapters and an appendix (reference), is divided into four sections. Part 1 (1 to 3) introduces the basics of modern cryptography, including the basic concepts of cryptography, the basic system, the basic idea and the use of theoretical knowledge and so on. Part 2 (chapters 4-7) introduces the basic techniques of modern cryptography, including symmetric cryptography (block ciphers, stream ciphers), Hash functions, public-key cryptography technology. Section 3 (8 to 10 chapters) introduces the basic applications of modern cryptography, including digital signature technology, key management, cryptographic protocols and so on. Part 4 (Chapter 11) on the future development of modern cryptography were discussed.
Date : 2025-12-30 Size : 396kb User : Ido

DL : 0
哈希表的 原理 类别 实现 哈希表的 原理 类别 实现-The principle of the hash table hash table to achieve the principle of class class class implementation to achieve the principles of the hash table
Date : 2025-12-30 Size : 1.1mb User : xuy

针对如何选择在什么情况下使用hash函数,得到对整个系统的提升做了详细了分析-detailed analysis of deciding under which circumstance should designer choose to use hash function
Date : 2025-12-30 Size : 214kb User : 陆沉
« 12 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.