Description:
本算法的输入时最大长度小于2128比特的消息串,输出是512比特的消息摘要,输入消息以1024比特的分组为单位进行处理。真实地模拟了SHA512散列函数发生器-The algorithm input is less than the maximum length of 2128-bit message string, the output is 512-bit message digest, enter the message to 1024-bit group as a unit for processing. Realistic simulation of the SHA512 hash function generator Platform: |
Size: 68608 |
Author:wildkaede |
Hits:
Description: Hash函数实例,所用文章为5000单词以内,所以初始为求出所取单词的hash值,然后对1901求余,所得的余数作为一个数组的下标,数组的每一个数又是一个链表,凡余数相同的单词放入同一链表.此为所构造的hash函数.-Hash function examples used in the article for the 5000 words or less, so the initial word is derived by taking the hash value, and then seek to 1901 while the remainder of the proceeds as a subscript array, the array of each number is also a linked list, Where more than the same number of words placed in the same list. This is the structure of the hash function. Platform: |
Size: 3072 |
Author:王争社 |
Hits:
Description: 创建一个包装学生信息的java类:包括name,number, age,height,创建该对象的数组用于表示n个学生的信息,并具备显示所有学生信息,查找某个学生的功能。(有输入流,输入数据,使用hash表存储数据)
包含相关代码和运行结果-Create a package of java category of student information: including name, number, age, height, create the object array used to represent n student information and have the capacity to display information for all students to find a student function. (With input flow, input data, the use of hash table to store data) contains the relevant code and operating results Platform: |
Size: 13312 |
Author:zhou |
Hits:
Description: SHA512 is a hash function. You can use sha512 with an asymetric method to sign a document. Platform: |
Size: 3072 |
Author:mathlouthi |
Hits:
Description: SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-512 (这些有时候也被称做 SHA-2)。
-SHA (Secure Hash Algorithm, Secure Hash Algorithm translated) is a U.S. National Security Agency (NSA) design, the U.S. National Institute of Standards and Technology (NIST) released a series of password hash function. Formally known as the SHA family members of the first release in 1993. But now people take it the informal name of a SHA-0 in order to avoid confusion of its successor. Two years later, SHA-1, the first successor to SHA issued. There are four variants have been released to enhance the output of some minor changes to the scope and design: SHA-224, SHA-256, SHA-384 and SHA-512 (these are sometimes also known as SHA-2). Platform: |
Size: 1024 |
Author:陈诚 |
Hits:
Description: (1) 建立一个哈希表,哈希函数为除留余数法,处理冲突的方法为线性探测再散列或二次探测再散列。
(2) 往哈希表中依次存入插入多个单词。
(3) 显示哈希表的存储情况。
(4) 计算哈希表的平均查找长度。
(5) 程序模块化设计。
-(1) the establishment of a hash table, a hash function other than stay the remainder method, the method of dealing with conflict, linear probing hash or quadratic probing hash. (2) to the hash table is sequentially stored into the multiple words. (3) the storage of the hash table. (4) Calculate the average length of the hash table. (5) The program modular design. Platform: |
Size: 34816 |
Author:王雪 |
Hits:
Description: 这款软件采用Java编写,主要实现了将任意长度的单项散列函数进行加密。-Using Java , this software mainly realizes the encryption for the arbitrary length of hash function. Platform: |
Size: 151552 |
Author:张一 |
Hits: