Introduction - If you have any usage issues, please Google them yourself
1) understanding hash functions in network security applications (2) master Hash Function Principle 2 require (1) using any programming language to achieve complete hash of functionality (2) the importation of any eight-byte (64 spaces) data, draw the corresponding eight hash code (Abstract)
Packet : 91331994hash2131.rar filelist
Hash\Hash.clw
Hash\ReadMe.txt
Hash\Hash.h
Hash\Hash.cpp
Hash\StdAfx.h
Hash\StdAfx.cpp
Hash\res\Hash.rc2
Hash\res\Hash.ico
Hash\res
Hash\Hash.dsp
Hash\Hash.dsw
Hash\Hash.ncb
Hash\Debug
Hash\Hash.plg
Hash\Resource.h
Hash\HashDlg.h
Hash\HashDlg.cpp
Hash\Hash.aps
Hash\Hash.rc
Hash\Hash.opt
Hash