Welcome![Sign In][Sign Up]
Location:
Search - rar hash

Search list

[Mathimatics-Numerical algorithmshash.rar

Description:
Platform: | Size: 6334 | Author: | Hits:

[Other resourcemimaxue_ppt

Description: 非常不错的密码学课件(PPT),共20个文件 1[1].密码学与计算机安全2002-01.ppt 2[1].密码学与计算机安全.ppt 3[1].古典替换密码.ppt 4[1].古典变换密码.ppt 5[1].古典变换密码与乘积密码.ppt 6[1].现代密码学.ppt 7[1].现代分组密码-des.ppt 8[1].数论理论介绍.ppt 9[1].公钥密码学.ppt 10[1].公钥加密算法(续).ppt 11[1].认证、哈希算法.ppt 13[1].数字签名算法.ppt 17[1].ssl协议.rar 18[1].古典替换密码cont.ppt 19[1].可信的计算机系统.ppt 20[1].密钥管理与证书.ppt-very good cryptography Courseware (PPT), A total of 20 documents a [1]. cryptography and computer security 2002 - 01.ppt 2 [1]. Cryptography and computer security. ppt 3 [1]. Classical replace passwords. ppt 4 [1]. Classical transform password. 5 ppt [1]. Classical transform the product code and password. ppt 6 [1]. Modern cryptography. ppt 7 [1]. Modern a password-des.ppt 8 [1]. on the number theory. ppt 9 [1]. Public-key cryptography. pp t 10 [1]. Public-key encryption algorithm (continued). ppt 11 [1]. certification, Hash algorithm. ppt 13 [1]. Digital Signature Algorithm. ppt 17 [1]. ssl agreement. rar 1 8 [1]. Classical replace passwords cont.ppt 19 [1]. credible computer system. ppt 20 [ 1]. key management and certificate. ppt
Platform: | Size: 3093417 | Author: 孟繁宇 | Hits:

[WEB Codewindows2000

Description: WINDOWS NT2000 密码到散列的实现算法.rar-Windows NT2000 hash of the password algorithm. Rar
Platform: | Size: 6302 | Author: loveangel | Hits:

[Crack HackMD5demo

Description: MD消息摘要程序,MD5以512位分组来处理输入的信息,且每一分组又被划分为16个32位子分组,经过了一系列的处理后,算法的输出由四个32位分组组成,将这四个32位分组级联后将生成一个128位散列值。-MD news summary procedures, MD5 to 512 groups to deal with the importation of information and each group was divided into 16 groups of 32 seats, after a series of processing, the output from the algorithm four groups composed of 32, these four sub-32 will generate a cascade 128 the hash value.
Platform: | Size: 3072 | Author: 邱孝杰 | Hits:

[Othermimaxue_ppt

Description: 非常不错的密码学课件(PPT),共20个文件 1[1].密码学与计算机安全2002-01.ppt 2[1].密码学与计算机安全.ppt 3[1].古典替换密码.ppt 4[1].古典变换密码.ppt 5[1].古典变换密码与乘积密码.ppt 6[1].现代密码学.ppt 7[1].现代分组密码-des.ppt 8[1].数论理论介绍.ppt 9[1].公钥密码学.ppt 10[1].公钥加密算法(续).ppt 11[1].认证、哈希算法.ppt 13[1].数字签名算法.ppt 17[1].ssl协议.rar 18[1].古典替换密码cont.ppt 19[1].可信的计算机系统.ppt 20[1].密钥管理与证书.ppt-very good cryptography Courseware (PPT), A total of 20 documents a [1]. cryptography and computer security 2002- 01.ppt 2 [1]. Cryptography and computer security. ppt 3 [1]. Classical replace passwords. ppt 4 [1]. Classical transform password. 5 ppt [1]. Classical transform the product code and password. ppt 6 [1]. Modern cryptography. ppt 7 [1]. Modern a password-des.ppt 8 [1]. on the number theory. ppt 9 [1]. Public-key cryptography. pp t 10 [1]. Public-key encryption algorithm (continued). ppt 11 [1]. certification, Hash algorithm. ppt 13 [1]. Digital Signature Algorithm. ppt 17 [1]. ssl agreement. rar 1 8 [1]. Classical replace passwords cont.ppt 19 [1]. credible computer system. ppt 20 [ 1]. key management and certificate. ppt
Platform: | Size: 3093504 | Author: 孟繁宇 | Hits:

[Crack HackGetCRC32(CS)

Description: CRC32哈希算法的C#版源码.采用的是动态生成码表的方法.-CRC32-hash algorithm in C# version of the source code. The code is dynamically generated table method.
Platform: | Size: 23552 | Author: 李哓 | Hits:

[ICQ-IM-ChatQQAutoLogin

Description: 这是我写的一个QQ自登陆的源码,能够实现QQ自动登陆,用到MD5和HASH算法,感兴趣的可以看下!-This is a QQ, I wrote the source code from the landing, to realize automatic landing QQ, to use MD5 and HASH algorithms can facie interested!
Platform: | Size: 962560 | Author: sdafasdf | Hits:

[Crack HackSHA512

Description: 本算法的输入时最大长度小于2128比特的消息串,输出是512比特的消息摘要,输入消息以1024比特的分组为单位进行处理。真实地模拟了SHA512散列函数发生器-The algorithm input is less than the maximum length of 2128-bit message string, the output is 512-bit message digest, enter the message to 1024-bit group as a unit for processing. Realistic simulation of the SHA512 hash function generator
Platform: | Size: 68608 | Author: wildkaede | Hits:

[OS programCMap

Description: 模板容器类CMap的完整实现源代码,对于想学习哈希映射的朋友,这个类的实现可以丰富你的思路。-Template container class cmap realize the complete source code, for the want to learn hash mapping Friend, this kind of realize you can be rich in ideas.
Platform: | Size: 149504 | Author: david | Hits:

[Data structsHFMBM

Description: 问题描述: 设计哈希表实现电话号码查询系统。 基本要求: 1、设每个记录有下列数据项:电话号码、用户名、地址; 2、从键盘输入各记录,分别以电话号码和用户名为关键字建立哈希表; 3、采用再哈希法解决冲突; 4、查找并显示给定电话号码的记录; 5、查找并显示给定用户名的记录。 6、在哈希函数确定的前提下,尝试各种不同类型处理冲突的方法(至少两种),考察平均查找长度的变化。 -Problem Description: Design hash table to achieve telephone number inquiry system. Basic requirements: 1, for each record the following data items: telephone numbers, user name, address 2, from the keyboard input of the records, respectively, telephone number and user name to establish Hashtable keywords 3, using recycled Kazakhstan Greek law to resolve conflicts 4, find and display a given telephone number of record 5, find and display a given user name records. 6, in the hash function to determine, under the premise of trying to deal with different types of conflict (at least two), visit Find the length of the average change.
Platform: | Size: 205824 | Author: 迟浩东 | Hits:

[Crack HackElgamal

Description: 本项目实现Elgalma体制的加解密,公私钥生成后分别放于不同的文件中。用该密码体制实现了对任意数据类型的加解密以及实现了数据签名验证算法。本项目中我实现的是32位的算法。其中,数字签名验证算法是对hash摘要值(SHA-1算法产生的)进行签名,并进行验证。-The project implementation Elgalma system encryption and decryption, public and private key to generate, after put in a different file. Cryptosystem with the implementation of arbitrary data types as well as the implementation of encryption and decryption of data Signature verification algorithm. I realize this project are the 32 algorithms. Among them, the digital signature verification algorithm is a summary hash value (SHA-1 algorithm generated) for signatures, and verify it.
Platform: | Size: 4096 | Author: 蔡吉欣 | Hits:

[CSharphuxiaoli

Description: 数据结构课程设计,利用Hash技术统计C源程序中关键字。本程序主要分为两个模块,一是用Hash表存储c语言中32个关键字,再扫描c源程序取出每个单词,利用Hash查找技术统计该程序中的关键字出现的频度;二是用顺序表存储c语言中的关键字,把c源程序取出每个单词利用二分查找技术统计该程序中的关键字的出现频度。-Data structure the curriculum design, the use of Hash technical statistics C source in the keyword. This procedure can be divided into two modules, one with the Hash table to store c language, 32 keywords, and then scan c source code out each word, using Hash technical statistics to find the program appears in the keyword frequency 2 is to use the order of the table is stored c language keywords to c source code out of each word to use binary search technology statistics of the program appears in the keyword frequency.
Platform: | Size: 6144 | Author: 胡晓莉 | Hits:

[Windows Developopenssl-0.9.8l

Description: Openssl0.9.8开发包.里面包含了很多的密码学算法,包括DES,HASH等,和PKI中证书的生成和使用.-This rar included openssl develpment kit.lots of cryto alth ,des ,hash etc...and the certi of pki included.
Platform: | Size: 6270976 | Author: weller | Hits:

[Data structshash

Description: Hash Implementation in C programming.
Platform: | Size: 1024 | Author: Abhishek | Hits:

[Crack HackMD5.RAR

Description: MD5 Hash Alghoritm Source Code
Platform: | Size: 368640 | Author: Tempak2 | Hits:

[Software Engineeringhaxibiao

Description: 人名为中国人姓名的汉语拼音形式。待填入哈希表的人名共有30个,... [HashList.rar] - 实现哈希表的建立 查找-Named after people, the Chinese name of the pinyin form. 30 to be filled into a hash table of names, ... [HashList.rar]- the establishment of the hash table lookup
Platform: | Size: 84992 | Author: longhuasong | Hits:

[Data structsHashTable.rar

Description: 《数据结构》课程中,Hash树的C++实现。具有很好的参考价值!,Hash Table implementation by C++ programming language.
Platform: | Size: 2048 | Author: 吴学明 | Hits:

[Linux drivermhash

Description: mhash.rar 研究hash table的一个很好的参考例子。 值得研究下-The Research hash table in mhash.rar a good example. Worthy of study under
Platform: | Size: 28672 | Author: | Hits:

[Linux-UnixDLMCOMMON.RAR

Description: Intended to make it easier for us to switch out hash functions.
Platform: | Size: 8192 | Author: dgcertq | Hits:

[Linux-UnixIP_SET_HASH_NETPORT.RAR

Description: Kernel module implementing an IP set type: the hash:net,port type.
Platform: | Size: 3072 | Author: rtlfqz | Hits:

CodeBus www.codebus.net