Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - hash code
Search - hash code - List
计算 HASH 值的 C 语言源代码  -calculated hash value of the C language source code
Update : 2025-03-14 Size : 5kb Publisher : 张历历

1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -1) understanding hash functions in network security applications (2) master Hash Function Principle 2 require (1) using any programming language to achieve complete hash of functionality (2) the importation of any eight-byte (64 spaces) data, draw the corresponding eight hash code (Abstract)
Update : 2025-03-14 Size : 1.8mb Publisher :

1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -1) understanding hash functions in network security applications (2) master Hash Function Principle 2 require (1) using any programming language to achieve complete hash of functionality (2) the importation of any eight-byte (64 spaces) data, draw the corresponding eight hash code (Abstract)
Update : 2025-03-14 Size : 817kb Publisher :

高亮语法类 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -syntax highlighter category 1) to understand the hash function in network security applications (2) real grasp Hash Function the two principles are, requirements (1) using any programming language to achieve complete hash of functionality (2) the importation of any eight-byte (64-bit ) data, draw the corresponding eight hash code (Abstract)
Update : 2025-03-14 Size : 55kb Publisher :

密码算法中的单向散列函数之SHA算法的C代码-password algorithm for one-way hash algorithm SHA Function of C code
Update : 2025-03-14 Size : 15kb Publisher : WQ

hash表和单向链表的实现代码,相当实用.-hash table and the realization of one-way linked list code useful.
Update : 2025-03-14 Size : 8kb Publisher : likebj

DL : 0
第一章:综合运用VC.NET与托管类 第二章: 正则表达式的运用 第三章: 注册表、文件IO 第四章:密码学、HASH代码、数据加密 第五章:XML ADO.NET 第六章: ADO.NET与dataset 第七章:高级ADO.net 第八章:ADO.NET与xml高级运用 第九章:远程处理 第十章:事件日志、进程控制、性能测试 第十一章:管理托管对象 -Chapter I: the integrated use of VC.NET with the Managed Classes chapter: the use of regular expressions in Chapter III: registry, file IO Chapter IV: Cryptography, HASH code, data encryption Chapter V: XML ADO.NET Article six chapters: ADO.NET and dataset Chapter VII: Advanced ADO.Net Chapter VIII: ADO.NET with xml senior use of Chapter IX: Remote handle Chapter X: event logs, process control, performance testing Chapter XI: Management Managed Object
Update : 2025-03-14 Size : 17.42mb Publisher : 方剑

hash代码实现和测试,包括新增、删除、查找-hash code and testing, including add, delete, search
Update : 2025-03-14 Size : 2kb Publisher : lp

DL : 0
哈希查找算法的源代码,可以在BC、TC、VC++上运行-Hash algorithm to find the source code, can BC, TC, VC++ Run
Update : 2025-03-14 Size : 1kb Publisher : zt

DL : 0
应用公钥加密体制的代表算法RSA 应用对称加密算法DES 应用散列算法MD5计算消息摘要 数字签名并验证-Application of public key encryption system RSA algorithm application on behalf of a symmetric encryption algorithm MD5 hash algorithm DES application calculated message digest and verify digital signatures
Update : 2025-03-14 Size : 84kb Publisher : 邓国文

DL : 0
一个hash表的实现以及测试代码,比顺序查找快100多倍-A hash table to achieve and test code, than to find the order of 100 times faster
Update : 2025-03-14 Size : 2kb Publisher : monk_lee

DL : 0
PHP服务器端HASH功能的源代码。编译后在服务器端使用。-PHP server-side source code HASH function. Compiled in the server-side use.
Update : 2025-03-14 Size : 119kb Publisher : barry

DL : 1
hash表算法,自己写的一段代码。希望对大家有用-hash table algorithm, written in his own piece of code. Hope useful for everyone
Update : 2025-03-14 Size : 4kb Publisher : yuhongchang

DL : 0
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data. -This project demonstrates the use of secure hash functions technique to implement a file encryption/decryption system. This implemented application can encrypt/decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
Update : 2025-03-14 Size : 196kb Publisher : vara

Java 16位MD5 Hash code generator-Java 16 md5 generator
Update : 2025-03-14 Size : 1kb Publisher : tony

DL : 0
一个数据结构作业 包含完整实验报告和源代码-Operation of a data structure that contains a complete test report and source code
Update : 2025-03-14 Size : 12kb Publisher : carol

(English) A sample to how calc and get hash code from a specific and browseable file. (Brazilian Portuguese) Um exemplo de como calcular e obter um código de hash a partir de um arquivo específico.
Update : 2025-03-14 Size : 12kb Publisher : Anderson Peterle

this is a very good hash code.
Update : 2025-03-14 Size : 11kb Publisher : qing

Linked lists hash code in C.
Update : 2025-03-14 Size : 2kb Publisher : Ifrit_01

java code for generating md5 hashing
Update : 2025-03-14 Size : 7kb Publisher : sachincha
« 12 3 4 5 6 7 8 9 10 ... 20 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.