搜索资源列表
Hash2131
- 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -1) understanding hash functions in network security applications (2) master Hash Function Principle 2 require (1) using any programming
2004052512573625343213132123
- 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -1) understanding hash functions in network security applications (2) master Hash Function Principle 2 require (1) using any programming
Hash-SHA
- 密码算法中的单向散列函数之SHA算法的C代码-password algorithm for one-way hash algorithm SHA Function of C code
SocketPool-0712
- 基于JXTA的P2P交通仿真程序,SimpleJxtaApp.java为主控文件,RoadGui为图形界面,MD5为Hash码生成文件,Cartest01为车辆Agent文件,另外一个对等组工具文件PeerGroupTool。-based on the JXTA P2P traffic simulation program, SimpleJxtaApp.java for controlling documents, RoadGui for the graphic interface, MD5 H
Hash-ipstatistic
- 以IP地址为例,介绍采用Hash技术统计分析海量数据,结果存入数据库,由于数据库文件太大,只上载了Java源代码-IP addresses as an example, the use of statistical analysis Hash Massive technical data, the results are stored in the database. As the database files too, with only contains the Java source co
thexcs_src
- Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The original Tiger Hash code was taken from Tiger.Net which is written in Visual Basic. NET. Tiger Tree Hash算法的C#实现! -Tiger Tree Hash is constructed fr
MD5Encode
- Java 16位MD5 Hash code generator-Java 16 md5 generator
2005112814355760
- 高亮语法类 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -syntax highlighter category 1) to understand the hash function in network security applications (2) real grasp Hash Function th
doc2
- This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the
hash
- 一个数据结构作业 包含完整实验报告和源代码-Operation of a data structure that contains a complete test report and source code
get_File_Hash_Code_Sample
- (English) A sample to how calc and get hash code from a specific and browseable file. (Brazilian Portuguese) Um exemplo de como calcular e obter um código de hash a partir de um arquivo específico.
Hash
- this is a very good hash code.
hash-lists
- Linked lists hash code in C.
HASH-code-implementation-using-VHDL
- implementation for Secure Hash Algorithm 1 SHA-1 in vhdl language contain no test file.
Classify-using-a-Hash-code
- 基于 Pyramid Matching的 图像hashing识别(IEEE 最新文章) -Classifying Sets of Attributed Scattering Centers Using a Hash Coded Database
hash
- 数据结构实验中的hash源码。。c实现的。可以-Experimental data structure of the hash code. . c achieve. You can take a look
Hash table
- Represents a collection of key/value pairs that are organized based on the hash code of the key. Implemented by "Separate chaining" where each bucket is independent, and has list of entries with the same index.
hash
- tWITTER hASH coDE fETCHER
Hash Generator
- java code for generating md5 hashing
cloc-1.64.tar
- Program to calculate a hash code