CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - MATLAB Hash
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - MATLAB Hash - List
[
Crack Hack
]
hash
DL : 2
这是一个用matlab写的hash函数,相信对用matlab做实验仿真的同学有所帮助
Update
: 2008-10-13
Size
: 1.55kb
Publisher
:
王量
[
Crack Hack
]
hash
DL : 0
这是一个用matlab写的hash函数,相信对用matlab做实验仿真的同学有所帮助-This is a hash function written in matlab, I believe that using matlab simulation experiments help students
Update
: 2025-02-17
Size
: 1kb
Publisher
:
王量
[
Crack Hack
]
SHA_MatLab
DL : 0
SHA (安全Hash算法)是一种单向散列算法,可用于数字加密或数字签名,是比MD5更加安全的单向散列算法,与MD5算法一起时被应用最广泛的两种算法。-SHA (secure Hash algorithm) is a one-way hash algorithm, can be used for digital encryption or digital signature is more secure than the MD5 one-way hash algorithm, in conjunction with the MD5 algorithm was the most widely used two algorithms.
Update
: 2025-02-17
Size
: 5kb
Publisher
:
张汉江
[
matlab
]
surface-fitting
DL : 1
用Matlab语言实现的三维散列数据拟合-Using Matlab language realize three-dimensional hash data fitting
Update
: 2025-02-17
Size
: 819kb
Publisher
:
Geng Shaofei
[
Crack Hack
]
hashreplacement
DL : 1
在图像加密中用到的md5算法,也就是哈希置换-In the image of the md5 encryption algorithm used, that is, hash replacement
Update
: 2025-02-17
Size
: 1kb
Publisher
:
guaiguai
[
CA auth
]
hash
DL : 0
It verifies or generates a signature using the md5 algorithm.
Update
: 2025-02-17
Size
: 76kb
Publisher
:
lena
[
Documents
]
HashTIN
DL : 0
基于Hash函数的TIN拓扑关系重建,Hash函数的构造方法,基于Hash函数的TIN拓扑关系重建算法-Hash function based on the relationship between TIN topology reconstruction, Hash function construction method, based on the Hash function reconstruction algorithm TIN topological relations
Update
: 2025-02-17
Size
: 315kb
Publisher
:
李叶林
[
Other systems
]
hash
DL : 0
There are several problems related to the properties of the triangular mesh representation that describes a surface of an object. Sometimes, the surface is represented just as a set of triangles without any other information and the STL file format, which is used for data exchanges, is a typicalexampl e of this situation.
Update
: 2025-02-17
Size
: 478kb
Publisher
:
李叶林
[
Crack Hack
]
d2
DL : 0
利用HASH(采用sha-1算法)算法原理,设计数字签名的水印算法,完成嵌入、(提取)验证,-Use HASH (using sha-1 algorithm) algorithm, design of watermarking algorithms digital signature to complete the embedding, (extract) authentication,
Update
: 2025-02-17
Size
: 34kb
Publisher
:
尉玉林
[
CA auth
]
HMAC-SHA
DL : 0
hmac using SHA algorithm source code-hmac using SHA algorithm source code...
Update
: 2025-02-17
Size
: 94kb
Publisher
:
anshul khandelwal
[
Other
]
hashtable
DL : 0
calculate the hash based on the matlab
Update
: 2025-02-17
Size
: 4kb
Publisher
:
thirtyfive
[
Crack Hack
]
hash
DL : 0
亲测,很好用的hash function-Pro-test, a good hash function used
Update
: 2025-02-17
Size
: 1kb
Publisher
:
KKy
[
matlab
]
lshcode.tar
DL : 0
LSH 和e2LSH算法,感觉hash函数不怎么好。-LSH and e2LSH algorithm, hash function is not very good feeling.
Update
: 2025-02-17
Size
: 13kb
Publisher
:
lc
[
matlab
]
MD5
DL : 1
哈希函数MD5,自己在MATLAB仿真实现的代码。供大家学习交流。-hash funtion MD5 Matlab codes,which is edited for our studying
Update
: 2025-02-17
Size
: 12kb
Publisher
:
刘程浩
[
CA auth
]
hash
DL : 0
散列算法,用于生成原始消息的数字指纹,本算发基于MATLAB编写,本算法包含多种流行的散列算法,包括SHA1和SHA-256等广泛应用的散列算法,通过本程序,可以对几种广泛应用的散列算法进行调用-Hash algorithm used to generate the digital fingerprint of the original message, this is based on MATLAB, this algorithm contains a variety of popular hash algorithm, including SHA1 and SHA- 256 hash algorithm is widely used, through this program, several widely used hash algorithms can be invoked
Update
: 2025-02-17
Size
: 1kb
Publisher
:
奥巴马
[
Crack Hack
]
hash
DL : 0
哈希函数的matlab代码,此函数不可逆,具有加密功能。-Hash function matlab code, this function is not reversible, with encryption features.
Update
: 2025-02-17
Size
: 1kb
Publisher
:
夏彬彬
[
matlab
]
HASH
DL : 0
经典哈希算法,用MATLAB实现。20个字限制-Hash algorithm with MATLAB.
Update
: 2025-02-17
Size
: 1kb
Publisher
:
米克
[
Other
]
DataHash
DL : 0
官方哈希加密算法 % EXAMPLES: % % Default: MD5, hex: % DataHash([]) % 5b302b7b2099a97ba2a276640a192485 % % MD5, Base64: % Opt = struct('Format', 'base64', 'Method', 'MD5'); % DataHash(int32(1:10), Opt) % +tJN9yeF89h3jOFNN55XLg % % SHA-1, Base64: % S.a = uint8([]); % S.b = {{1:10}, struct('q', uint64(415))}; % Opt.Method = 'SHA-1'; % Opt.Format = 'HEX'; % DataHash(S, Opt) % 18672BE876463B25214CA9241B3C79CC926F3093 % % SHA-1 of binary values: % Opt = struct('Method', 'SHA-1', 'Input', 'bin'); % DataHash(1:8, Opt) % 826cf9d3a5d74bbe415e97d4cecf03f445f69225 % % SHA-256, consider ASCII part only (Matlab's CHAR has 16 bits!): % Opt.Method = 'SHA-256'; % Opt.Input = 'ascii'; % DataHash('abc', Opt) % % ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad % % Or equivalently: % Opt.Input = 'bin'; % DataHash(uint8('abc'), Opt)(Official hash encryption algorithm % EXAMPLES: % % Default: MD5, hex: % DataHash([]) % 5b302b7b2099a97ba2a276640a192485 % % MD5, Base64: % Opt = struct('Format', 'base64', 'Method', 'MD5'); % DataHash(int32(1:10), Opt) % +tJN9yeF89h3jOFNN55XLg % % SHA-1, Base64: % S.a = uint8([]); % S.b = {{1:10}, struct('q', uint64(415))}; % Opt.Method = 'SHA-1'; % Opt.Format = 'HEX'; % DataHash(S, Opt) % 18672BE876463B25214CA9241B3C79CC926F3093 % % SHA-1 of binary values: % Opt = struct('Method', 'SHA-1', 'Input', 'bin'); % DataHash(1:8, Opt) % 826cf9d3a5d74bbe415e97d4cecf03f445f69225 % % SHA-256, consider ASCII part only (Matlab's CHAR has 16 bits!): % Opt.Method = 'SHA-256'; % Opt.Input = 'ascii'; % DataHash('abc', Opt) % % ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad % % Or equivalently: % Opt.Input = 'bin'; % DataHash(uint8('abc'), Opt))
Update
: 2025-02-17
Size
: 6kb
Publisher
:
longgyy
[
Windows Develop
]
md5
DL : 0
在MATLAB上可运行的计算文件md5哈希值的算法文件(Algorithm file for calculating file md5 hash value that can be run on MATLAB)
Update
: 2025-02-17
Size
: 2kb
Publisher
:
玉龙3333
[
Crack Hack
]
MD5散列函数的MATLAB代码
DL : 0
利用散列哈希函数对信息进行散列,产生一个定长的信息摘要,从而可实现消息的认证和完整性验证(Hash function is used to hash information to produce a certain length of information summary, which can realize message authentication and integrity verification.)
Update
: 2025-02-17
Size
: 94kb
Publisher
:
fanya95
«
1
2
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.