Location:
Search - hash document
Search list
Description: SHA-1Hash函数源码,可以对任何文件做Hash,得到的Hash值为160位。具有抗强碰撞,弱碰撞等能力。虽然王小云已经找到了个别碰撞。但在新的好的hash函数出来之前仍将被广泛使用。-SHA-1Hash function source, any document can be done right hash, the hash value of 160. Anti-collision, the weak capabilities of the collision. Although Bruce Schneier, had found individual collisions. But the new good hash function will be out before widespread use.
Platform: |
Size: 28059 |
Author: 王国维 |
Hits:
Description: HMAC即带密钥的HASH函数,用它产生的报文鉴别码(MAC)可以实现报文鉴别。这里我将其做成一个软件,用于对文件的合法性进行校验。以下我先简单介绍软件相关背景知识再介绍其代码实现。
-HMAC key is to bring the hash function, used the text of the report identifying code (MAC) can realize the text identification. I am here to create a software for the document verifying the legitimacy. I briefly introduce software-related background knowledge will introduce its implementation of the code.
Platform: |
Size: 50008 |
Author: 杨飞 |
Hits:
Description: 网络蜘蛛1.3版,
功能变更:
1. 关于对处理过URL和待处理URL的存储检索。
利用文件系统存储这些信息,利用Hash碰撞分页算法,加上最新数据的内存缓存,实现高效的信息检索。平均检索的效率0.01s
2. 修改前面版本URL替换产生的中文问题。
-network spider version 1.3, the functional changes : 1. On the right URL and processed pending the URL storage and retrieval. Use of document storage systems such information, the use of tabs collision Hash algorithm, with the latest data cache memory to achieve efficient information retrieval. Average retrieval efficiency 0.01s 2. Earlier versions of the URL changes replace the Chinese language.
Platform: |
Size: 1044696 |
Author: 周某人 |
Hits:
Description: 利用哈希函数对学生姓名进行最优化查找 可选择从键盘输入和文件输入,需输入名字最大长度-hash function to the students find the most optimal choice from the keyboard input and the input document, name must be imported maximum length
Platform: |
Size: 1653 |
Author: houny |
Hits:
Description: 基于JXTA的P2P交通仿真程序,SimpleJxtaApp.java为主控文件,RoadGui为图形界面,MD5为Hash码生成文件,Cartest01为车辆Agent文件,另外一个对等组工具文件PeerGroupTool。-based on the JXTA P2P traffic simulation program, SimpleJxtaApp.java for controlling documents, RoadGui for the graphic interface, MD5 Hash code generation for the document, Cartest01 Agent for the vehicle documents, Another group of reciprocity PeerGroupTool document tools.
Platform: |
Size: 90899 |
Author: 缪青海 |
Hits:
Description: 散列文件的操作,四个操作:向散列中插入一个元素,删除一个元素,查找散列中的元素,输出散列元素等。-hash document, the operation of four operators : to insert a hash elements, delete an element Search hash of elements, such as elements of the output hash.
Platform: |
Size: 4550 |
Author: 刘莹 |
Hits:
Description: SHA-1Hash函数源码,可以对任何文件做Hash,得到的Hash值为160位。具有抗强碰撞,弱碰撞等能力。虽然王小云已经找到了个别碰撞。但在新的好的hash函数出来之前仍将被广泛使用。-SHA-1Hash function source, any document can be done right hash, the hash value of 160. Anti-collision, the weak capabilities of the collision. Although Bruce Schneier, had found individual collisions. But the new good hash function will be out before widespread use.
Platform: |
Size: 27648 |
Author: 王国维 |
Hits:
Description: HMAC即带密钥的HASH函数,用它产生的报文鉴别码(MAC)可以实现报文鉴别。这里我将其做成一个软件,用于对文件的合法性进行校验。以下我先简单介绍软件相关背景知识再介绍其代码实现。
-HMAC key is to bring the hash function, used the text of the report identifying code (MAC) can realize the text identification. I am here to create a software for the document verifying the legitimacy. I briefly introduce software-related background knowledge will introduce its implementation of the code.
Platform: |
Size: 50176 |
Author: 杨飞 |
Hits:
Description: 网络蜘蛛1.3版,
功能变更:
1. 关于对处理过URL和待处理URL的存储检索。
利用文件系统存储这些信息,利用Hash碰撞分页算法,加上最新数据的内存缓存,实现高效的信息检索。平均检索的效率0.01s
2. 修改前面版本URL替换产生的中文问题。
-network spider version 1.3, the functional changes : 1. On the right URL and processed pending the URL storage and retrieval. Use of document storage systems such information, the use of tabs collision Hash algorithm, with the latest data cache memory to achieve efficient information retrieval. Average retrieval efficiency 0.01s 2. Earlier versions of the URL changes replace the Chinese language.
Platform: |
Size: 1044480 |
Author: 周某人 |
Hits:
Description: 散列文件的操作,四个操作:向散列中插入一个元素,删除一个元素,查找散列中的元素,输出散列元素等。-hash document, the operation of four operators : to insert a hash elements, delete an element Search hash of elements, such as elements of the output hash.
Platform: |
Size: 4096 |
Author: 刘莹 |
Hits:
Description: 散列表又叫哈希表,它是通过哈希函数来确定数据元素存放位置的一种特殊表结构。程序实现对指定文本文件中的单词进行检索,并可得哈希值-hashtable known as hash table, it is through the hash function to determine the location of data elements stored in a special table structure. Program of the DOE document, the text word search, may have hashes
Platform: |
Size: 12288 |
Author: dfa |
Hits:
Description: 利用hash表进行文件的比较,用vc++写的。-Document the use of hash table comparison, using vc++ Written.
Platform: |
Size: 30720 |
Author: xutuan |
Hits:
Description: 使用C++语言的STL开发的一个用来进行大规模hash计算的程序,用来处理大规模ip地址的查找问题,输入的文件可以是从internet
上下载的ip地址数据,也可以自己输入数据,可以支持几百兆的数据文件的分析与查找。格式如下
ip1 ip2 ip3 ...
例如:100.100.100.100 200.200.200.200 -The use of C++ Language STL to develop a large-scale used for hash calculation procedures used to deal with large-scale search ip address the problem, type of document can be downloaded from the internet the ip address of the data can also input their own data, can support several hundreds of megabytes of data file analysis and search. The following format ip1 ip2 ip3 ... for example: 100.100.100.100 200.200.200.200
Platform: |
Size: 349184 |
Author: 魏木木 |
Hits:
Description: 利用hash表转换拼音到汉字,通过建立hash表,将汉语和拼音建立联系,然后调用此hash表,来翻译要翻译的文件-The use of hash table convert Pinyin to Chinese characters, through the establishment of hash tables, will be in Chinese and Pinyin establish contacts, and then call this hash table to translate the document to be translated
Platform: |
Size: 1024 |
Author: 马军 |
Hits:
Description: 采用C语言实现MD5哈希摘要算法,对文件进行哈希得到哈希摘要-Using C language digest algorithm MD5 hash of the document have been hash hash Abstract
Platform: |
Size: 6144 |
Author: Ivan |
Hits:
Description: boost和loki是重要的c++库,此文档是侯捷关于boost的最新研究成果,包括boost和loki的一些组件(pool,any,hash等)实现与应用及与stl的比较,有一定难度。-loki is an important boost, and the c++ library, Hou Jie, this document on the boost of the latest research results, including the boost and some of loki component (pool, any, hash, etc.) with the application and comparison with stl There is a certain degree of difficulty.
Platform: |
Size: 5720064 |
Author: 张秋道 |
Hits:
Description: 写了一个文件加解密工具(VC9+OPENSSL)
CA程序:
生成2个RSA密钥对,分别保存为PEM格式,密码保护私钥,文件名为“RSAPrivateKey.pem”和“RSAPublicKey.pem”。
加密:
将指定明文文件加密,密文件格式自已定义,要求文件内容用对称算法(3des)加密,对称密钥(KEY)为随机生成,随机密钥用“RSAPrivateKey.pem”的公钥加密后,存放在密文文件头内(KEY1);对明文文件做摘要计算(HASH),将计算结果用“RSAPublicKey.pem”的私钥加密后(SIGN),放到密文文件头内;文件头内有明文的原始长度信息。
解密:
将密文文件解密成明文文件,流程与加密相反,先用“RSAPrivateKey.pem”私钥解密(KEY1)数据,得出随机密钥(KEY);用随机密钥对密文解密,得到明文文件;对明文文件进行摘要计算,得出HASH1;用“RSAPublicKey.pem”公钥解密SIGN,得出HASH2;HASH1与HASH2做对比,相同表示解密成功,不同表示解密失败。
密文文件头内可以保存原始加密人的信息以及解密人的信息,这样可以快速判断解密者是否有权限解密该密文文件,如果有权限则进行解密过程,否则直接提示没有权限解密。
-To write a file encryption and decryption tool (VC9+ OPENSSL)
CA procedures:
Generates two RSA key pairs, respectively, save for the PEM format, password-protected private key, the file named "RSAPrivateKey.pem" and "RSAPublicKey.pem".
Encryption:
The specified plaintext file encryption, secret self-definition file formats require the document to use symmetric algorithms (3des) encryption, symmetric key (KEY) is randomly generated, random key to use "RSAPrivateKey.pem" public key encryption, stored in the ciphertext header inside (KEY1) summary of the calculation of the plaintext file to do (HASH), the calculation results with the "RSAPublicKey.pem" private key encryption (SIGN), into ciphertext in the file header file header if there is express The original length of the message.
Decryption:
Decrypt the ciphertext into a plaintext file documents, processes and encrypt the contrary, the first to use "RSAPrivateKey.pem" decrypt the private key (KEY1) data, derived random k
Platform: |
Size: 1097728 |
Author: 张希行 |
Hits:
Description: In computer science and data mining, Apriori is a classic algorithm for learning association rules. Apriori is designed to operate on databases containing transactions. The algorithm attempts to find subsets which are common to at least a minimum number C (the cutoff, or confidence threshold) of the item sets. Apriori uses a "bottom up" approach, where frequent subsets are extended one item at a time (a step known as candidate generation) and groups of candidates are tested against the data. The algorithm terminates when no further successful extensions are found. Apriori uses breadth-first search and a hash tree structure to count candidate item sets efficiently.-In computer science and data mining, Apriori is a classic algorithm for learning association rules. Apriori is designed to operate on databases containing transactions. The algorithm attempts to find subsets which are common to at least a minimum number C (the cutoff, or confidence threshold) of the item sets. Apriori uses a "bottom up" approach, where frequent subsets are extended one item at a time (a step known as candidate generation) and groups of candidates are tested against the data. The algorithm terminates when no further successful extensions are found. Apriori uses breadth-first search and a hash tree structure to count candidate item sets efficiently.
Platform: |
Size: 271360 |
Author: qw |
Hits:
Description: Document contains implementation details to implement Secure Hash Function for networking.
Platform: |
Size: 168960 |
Author: Sunil |
Hits:
Description: encoding secure hash algorithm document
.
Platform: |
Size: 9216 |
Author: benaz |
Hits: