Welcome![Sign In][Sign Up]
Location:
Search - hash code

Search list

[source in ebook计算 HASH 值的 C 语言源代码  

Description: 计算 HASH 值的 C 语言源代码  -calculated hash value of the C language source code
Platform: | Size: 5120 | Author: 张历历 | Hits:

[Crack HackHash2131

Description: 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -1) understanding hash functions in network security applications (2) master Hash Function Principle 2 require (1) using any programming language to achieve complete hash of functionality (2) the importation of any eight-byte (64 spaces) data, draw the corresponding eight hash code (Abstract)
Platform: | Size: 1884160 | Author: | Hits:

[TreeView2004052512573625343213132123

Description: 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -1) understanding hash functions in network security applications (2) master Hash Function Principle 2 require (1) using any programming language to achieve complete hash of functionality (2) the importation of any eight-byte (64 spaces) data, draw the corresponding eight hash code (Abstract)
Platform: | Size: 836608 | Author: | Hits:

[Crack Hack2005112814355760

Description: 高亮语法类 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -syntax highlighter category 1) to understand the hash function in network security applications (2) real grasp Hash Function the two principles are, requirements (1) using any programming language to achieve complete hash of functionality (2) the importation of any eight-byte (64-bit ) data, draw the corresponding eight hash code (Abstract)
Platform: | Size: 56320 | Author: | Hits:

[Crack HackHash-SHA

Description: 密码算法中的单向散列函数之SHA算法的C代码-password algorithm for one-way hash algorithm SHA Function of C code
Platform: | Size: 15360 | Author: WQ | Hits:

[Data structslist_hash

Description: hash表和单向链表的实现代码,相当实用.-hash table and the realization of one-way linked list code useful.
Platform: | Size: 8192 | Author: likebj | Hits:

[VC/MFCvc.net

Description: 第一章:综合运用VC.NET与托管类 第二章: 正则表达式的运用 第三章: 注册表、文件IO 第四章:密码学、HASH代码、数据加密 第五章:XML ADO.NET 第六章: ADO.NET与dataset 第七章:高级ADO.net 第八章:ADO.NET与xml高级运用 第九章:远程处理 第十章:事件日志、进程控制、性能测试 第十一章:管理托管对象 -Chapter I: the integrated use of VC.NET with the Managed Classes chapter: the use of regular expressions in Chapter III: registry, file IO Chapter IV: Cryptography, HASH code, data encryption Chapter V: XML ADO.NET Article six chapters: ADO.NET and dataset Chapter VII: Advanced ADO.Net Chapter VIII: ADO.NET with xml senior use of Chapter IX: Remote handle Chapter X: event logs, process control, performance testing Chapter XI: Management Managed Object
Platform: | Size: 18260992 | Author: 方剑 | Hits:

[Software Engineeringhash

Description: hash代码实现和测试,包括新增、删除、查找-hash code and testing, including add, delete, search
Platform: | Size: 2048 | Author: lp | Hits:

[ConsoleHASH

Description: 哈希查找算法的源代码,可以在BC、TC、VC++上运行-Hash algorithm to find the source code, can BC, TC, VC++ Run
Platform: | Size: 1024 | Author: zt | Hits:

[Crack Hackcode

Description: 应用公钥加密体制的代表算法RSA 应用对称加密算法DES 应用散列算法MD5计算消息摘要 数字签名并验证-Application of public key encryption system RSA algorithm application on behalf of a symmetric encryption algorithm MD5 hash algorithm DES application calculated message digest and verify digital signatures
Platform: | Size: 86016 | Author: 邓国文 | Hits:

[Data structsHASH

Description: 一个hash表的实现以及测试代码,比顺序查找快100多倍-A hash table to achieve and test code, than to find the order of 100 times faster
Platform: | Size: 2048 | Author: monk_lee | Hits:

[Web Serverhash

Description: PHP服务器端HASH功能的源代码。编译后在服务器端使用。-PHP server-side source code HASH function. Compiled in the server-side use.
Platform: | Size: 121856 | Author: barry | Hits:

[Data structshash

Description: hash表算法,自己写的一段代码。希望对大家有用-hash table algorithm, written in his own piece of code. Hope useful for everyone
Platform: | Size: 4096 | Author: yuhongchang | Hits:

[Crack Hackdoc2

Description: This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data. -This project demonstrates the use of secure hash functions technique to implement a file encryption/decryption system. This implemented application can encrypt/decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
Platform: | Size: 200704 | Author: vara | Hits:

[Crack HackMD5Encode

Description: Java 16位MD5 Hash code generator-Java 16 md5 generator
Platform: | Size: 1024 | Author: tony | Hits:

[Data structshash

Description: 一个数据结构作业 包含完整实验报告和源代码-Operation of a data structure that contains a complete test report and source code
Platform: | Size: 12288 | Author: carol | Hits:

[File Operateget_File_Hash_Code_Sample

Description: (English) A sample to how calc and get hash code from a specific and browseable file. (Brazilian Portuguese) Um exemplo de como calcular e obter um código de hash a partir de um arquivo específico.
Platform: | Size: 12288 | Author: Anderson Peterle | Hits:

[Windows DevelopHash

Description: this is a very good hash code.
Platform: | Size: 11264 | Author: qing | Hits:

[Windows Develophash-lists

Description: Linked lists hash code in C.
Platform: | Size: 2048 | Author: Ifrit_01 | Hits:

[OtherHash Generator

Description: java code for generating md5 hashing
Platform: | Size: 7168 | Author: sachincha | Hits:
« 12 3 4 5 6 7 8 9 10 ... 20 »

CodeBus www.codebus.net