Welcome![Sign In][Sign Up]
Location:
Search - hash

Search list

[Data structsC_CODE

Description: 数据结构--C语言 数据结构源代码大全 用C语言编写-Data structure- C language source code data structure using C language Guinness
Platform: | Size: 15897600 | Author: 龙建武 | Hits:

[Crack Hackfips-198a

Description: This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared secret key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. The HMAC specification in this standard is a generalization of Internet RFC 2104, HMAC, Keyed-Hashing for Message Authentication, and ANSI X9.71, Keyed Hash Message Authentication Code.-err
Platform: | Size: 121856 | Author: leiuchan | Hits:

[Windows Develop1

Description: 基于HASH链的微支付系统模型研究,其特点类似于PAY WORD系统-err
Platform: | Size: 84992 | Author: cmc | Hits:

[Internet-Networkophcrack_1_0a

Description: 跟rainbow table结合破解windoes登陆密码及各种hash密码-Combined with the rainbow table to crack passwords and various landing windoes password hash
Platform: | Size: 5114880 | Author: yang | Hits:

[Data structswordseg

Description: 基于正向最大匹配法的分词。采用hash表技术将一段连续的话用所给词库进行分词输出。-Forward Maximum Matching Method Based on the sub-word. The use of hash table technology will be a continuous period, then used the word to the lexicon for output.
Platform: | Size: 71680 | Author: 王达山 | Hits:

[Crack HackLingangTools

Description: 在设计程序时,需要经常计算一个字串的哈希值,得到加密文本,生成加密过的配置文件或都转换EXCEL文件到SQL数据库等等,根据自己习惯定制部分功能,由于时间关系,没有详细说明-In the design process, requiring constant calculation of a string of hash value, encrypted text, to generate encrypted configuration file or EXCEL documents are converted into SQL database, etc., used to customize according to their functions, due to time constraints, no detailed description of
Platform: | Size: 120832 | Author: lingang | Hits:

[Crack Hacksha

Description: 主流hash函数--sha的源代码,可用于数据签名,是目前应用最广的算法之一-Sha mainstream hash function source code, can be used for data signatures, is the application of the algorithm, one of the most widely
Platform: | Size: 3072 | Author: jiang | Hits:

[OtherLinkCreator0.5_Src

Description: 比较老的版本,网上很难找到哦 用来创建ed2k链接,可包括http源和AICH Hash-Comparison of the old version, online is very difficult to find Oh used to create ed2k links, which may include http source and AICH Hash
Platform: | Size: 59392 | Author: 孙志炎 | Hits:

[TCP/IP stack200811014323652

Description: 自行封装的一个lib库,以动态连接库的方式提供支持,包含以下一些类: SH_Object libSH的基类 SH_String String类 SH_Array 数据结构Array类 SH_Stack 数据结构Stack类 SH_Queue 数据结构Queue类 SH_List 数据结构List类 SH_Hash 数据结构Hash类 SH_Tree 数据结构Tree(AVL)类 SH_Lock 互斥Lock类 SH_Serial 串口类 SH_Socket 套接字类 SH_Tcp TCP类 SH_Udp UDP类 SH_Multicast 多播类 SH_Broadcast 广播类 SH_RawSocket 原始套接字类 SH_Pipe 管道类 SH_Mailslot 邮槽类 SH_SMem 共享内存类 SH_Log 日志类 SH_File 文件类 SH_FileVer 文件版本信息类 SH_Audio 音频类 SH_Time 时间类 SH_Timer 定时器类
Platform: | Size: 58368 | Author: dsf | Hits:

[DSP programlevmar

Description:
Platform: | Size: 27648 | Author: James | Hits:

[Linux-Unixc-algorithms1.0.0.tar

Description: 常用的数据结构和算法函数库,比如集合、列表、树、队列、hash等。-Commonly used data structure and algorithm library, such as a collection of lists, trees, queues, hash and so on.
Platform: | Size: 340992 | Author: 渡渡鸟 | Hits:

[Data structsAddison.Wesley.Donald.E.Knuth.The.Art.of.Computer.

Description: 计算机科学的圣经 Knuth的经典之作 卷3为分拣和搜索,这是本书的第1个修订版,它是对计算机分拣和搜索的一流技术的最全面的研究,它扩展了卷1中数据结构的处理方法,将大小数据库以及内存和外部存储都包含在内。本书包括对计算机方法仔细检查的选择方案,和其效率的大量分析。本书该版的独特之处在于优化了的分拣,以及对通用散列法和排列法的新的理论论述。-Computer Science of the Bible, the classic Knuth Volume 3 for sorting and searching, this is the first book a revised edition, which is on the computer sorting and search of first-class technology, the most comprehensive study, which expands the volume 1 in the data structure approach to the size of the database, as well as memory and external storage are included. The book includes methods for computer double-check the options, and a large number of analysis of its efficiency. The edition of this book is unique in that optimizes the sorting, as well as general-purpose hash law and order law of the new theory.
Platform: | Size: 66604032 | Author: | Hits:

[Windows Developsearchhash

Description: 高质量的hash算法程序.可以自动生成hash tabel.-Hash algorithm for high-quality procedures. Can be automatically generated hash tabel.
Platform: | Size: 300032 | Author: linqixin | Hits:

[Data structshaxi

Description: 哈希表算法实现的C语言源程序,课本上的例子修改而成。-Hash table algorithm realize the C language source program, textbook examples of modifications made.
Platform: | Size: 1024 | Author: wu | Hits:

[.netHash_CSharp

Description: 使用C#语言开发的一个用来进行大规模hash计算的程序,用来处理大规模ip地址的查找问题,输入的文件可以是从internet 上下载的ip地址数据,也可以自己输入数据,可以支持几百兆的数据文件的分析与查找。格式如下 ip1 ip2 ip3 ... 例如:10.10.10.10 20.20.20.20 30.30.30.30
Platform: | Size: 7168 | Author: 魏木木 | Hits:

[Othertiaobiaosanliebiao

Description: 跳表散列表的抽象类及方法实现 谢谢大家-Jump table hash table of abstract class and methods realize I would like to thank everyone
Platform: | Size: 9216 | Author: CHENG | Hits:

[Crack HackSHA512

Description: 本算法的输入时最大长度小于2128比特的消息串,输出是512比特的消息摘要,输入消息以1024比特的分组为单位进行处理。真实地模拟了SHA512散列函数发生器-The algorithm input is less than the maximum length of 2128-bit message string, the output is 512-bit message digest, enter the message to 1024-bit group as a unit for processing. Realistic simulation of the SHA512 hash function generator
Platform: | Size: 68608 | Author: wildkaede | Hits:

[Crack HackDSA

Description: Digital Signature Algorithm (DSA)是Schnorr和ElGamal签名算法的变种,被美国NIST作为DSS(DigitalSignature Standard)。算法中应用了下述参数: p:L bits长的素数。L是64的倍数,范围是512到1024; q:p - 1的160bits的素因子; g:g = h^((p-1)/q) mod p,h满足h < p - 1, h^((p-1)/q) mod p > 1; x:x < q,x为私钥 ; y:y = g^x mod p ,( p, q, g, y )为公钥; H( x ):One-Way Hash函数。DSS中选用SHA( Secure Hash Algorithm )。 p, q, g可由一组用户共享,但在实际应用中,使用公共模数可能会带来一定的威胁。签名及验证协议如下: 1. P产生随机数k,k < q; 2. P计算 r = ( g^k mod p ) mod q s = ( k^(-1) (H(m) + xr)) mod q 签名结果是( m, r, s )。 3. 验证时计算 w = s^(-1)mod q u1 = ( H( m ) * w ) mod q u2 = ( r * w ) mod q v = (( g^u1 * y^u2 ) mod p ) mod q 若v = r,则认为签名有效。   DSA是基于整数有限域离散对数难题的,其安全性与RSA相比差不多。DSA的一个重要特点是两个素数公开,这样,当使用别人的p和q时,即使不知道私钥,你也能确认它们是否是随机产生的,还是作了手脚。RSA算法却作不到。
Platform: | Size: 136192 | Author: wildkaede | Hits:

[Windows DevelopMDC-4

Description: MDC4杂凑算法,用c语言实现,大家可以下载看看,交流交流-MDC4 hash algorithm, using c language, everyone can download and see the exchange of the exchange
Platform: | Size: 5120 | Author: 傅佩龙 | Hits:

[Crack HackMD5

Description: 安全散列函数MD5的源程序 ,主要部分,需要进行调试,-MD5 hash function security source, the main part, the need for debugging,
Platform: | Size: 6144 | Author: 谢宏强 | Hits:
« 1 2 ... 45 46 47 48 49 50»

CodeBus www.codebus.net