搜索资源列表
Hash
- 雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能快的完成,利用雜湊法是最適當不過了。因為雜湊表搜尋在沒有碰撞(collision)及溢位(over
adaptendian-md4
- 计算机芯片不同其大小印第安序不同,一般分为大印第安序和小印第安序,如果不能自动区别,用于签名验证的hash函数结果不一样,不能验证-Indian computer chip the size of the different sequence of different, generally divided into large and small Indian Indian sequence order, if the distinction does not automatically use
adaptendian-sha1
- 计算机芯片不同其大小印第安序不同,一般分为大印第安序和小印第安序,如果不能自动区别,用于签名验证的hash函数结果不一样,不能验证-Indian computer chip the size of the different sequence of different, generally divided into large and small Indian Indian sequence order, if the distinction does not automatically use
beecrypt-4.1.2.tar
- 是一个正在进行的项目,提供强有力的和快速的加密形式的工具包使用的商业和开放源代码项目。库包括:随机数生成器,分组密码,散列函数,消息认证码-Is an ongoing project to provide a strong and fast encryption tool kit used in the form of commercial and open source projects. Library include: random number generator, block ciph
shacal
- Algoritm SHACAL-2 Block simmetric shiper vitch hash function good algoritm best of the simmetric algorim shiper
sha1
- In cryptography, SHA-1 is a cryptographic hash function designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm.
sha1
- 哈希函数加解密图片代码《喜欢的朋友下载吧,下完就能用的-Encryption and decryption picture code " hash function like friends download is finished will be able to use
haxihanshu-SHA-1suanfa
- 哈希函数SHA-1的c实现,能正常运行。很实用,适合用来学习sha-1,希望对你有帮助。-A hash function is SHA-1 (c) achieve normal operation. Very practical, ideal for learning the sha-1, you want to help.
HashMD5
- 实现hashmd5功能的杂凑算法,广泛应用身份认证、签名认证等。-Realizing the function of hashmd5 hash algorithm, which are widely used authentication, signature, authentication, etc.
SHA1Tool
- SHA-1 is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST
md5
- 通过实现数字签名算法(DSA),加深对数字签名算法的理解,同时学习Hash算法的实现。 1)利用C\C++语言实现DSA算法。 2)DSA中的Hash函数采用SHA算法。 -By implementing the Digital Signature Algorithm (DSA), a better understanding of the digital signature algorithm, while learning to achieve Hash algorithm. 1
4
- Cryptographic Hash Functions: A cryptographic hash function must have at least two security properties: collision free and Hiding. Collision free property ensures that for a given function H, no one can find x and y such that H(x) = H(y). The hid
