搜索资源列表
sha1
- Freeware implementation of the Secure Hashing Standard, defined in FIPS PUB 180-1, defines the Secure Hashing Algorithm (SHA-1). SHA-1 can be used to produce a message digest for a given message. Essentially, this is a 160-bit number that represents
blacklist
- 黑名单设计,用C语言写的一个黑名单的快速查找,用哈希平衡二叉树算法-Black design, with the C language written in a blacklist to quickly find, use a balanced binary tree hashing algorithm
CrypTest
- MD5 hashing function
SHATEST
- 在51单片机上实现哈希算法,SHA-1,产生数据摘要,已通过测试-In MCS-51 to achieve hashing algorithm, SHA-1, produces data extracts, has been tested
11Hashing.key
- 哈希表的MIT的课件,提前说明,是英文的哦,希望大家踊跃下载-Hashing key
SHA
- A code for Secure Hashing
Linear_Has2177703232010
- 一个线性散列表DEMO,允许用户插入空表并观察其增长情况(每次插入后重新显示)。-Title: Linear Hashing Example Descr iption: Demonstrate how linear hashing works by allowing users to insert elements into an empty hash table and see how it grows (hash table is re-displayed after every ins
stringhashing
- Some handy string hashing methods.
AlgoritmRabina_Karpa
- The Rabin–Karp algorithm is a string searching algorithm created by Michael O. Rabin and Richard M. Karp in 1987 that uses hashing to find any one of a set of pattern strings in a text. For text of length n and p patterns of combined length m, its av
venkie00robust
- Due to the popularity of digital technology, more and more digital images are being created and stored every day. This introduces a problem for managing image databases. Here we introduce a novel algorithm that utilizes a wavelet representation of im
CryptoAPI1.0_cn_ix
- 本中文文档详细说明CryptoAPI(一个应用程序编程接口)(带目录方便查询),目的就是提供开发者在Windows 下使用PKI 的编 程接口。CryptoAPI 提供了很多函数,包括编码、解码、加密、解密、哈希、数字证书、 证书管理和证书存储等功能。对于加密和解密,CryptoAPI 同时提供基于会话密钥和公 钥/私钥对的方法。-The Chinese document details CryptoAPI (an application programming interface)
QUADRATI
- c++ program for hashing using quadratic probing method
chazhao
- 哈希表的查找。用线性探测在散列的方法建立哈希表,然后对其中的元素进行查找-Hash table lookup. Hashing by linear probing method to establish the hash table, and then find the elements of which
Md5
- 邮件加密源代码,可用于数字签名,散列处理-E-mail encryption source code can be used for digital signatures, hashing
hashing
- source code of C and C++ using hash tables
hash
- 本程序可实现哈希表的建立,并用线性探测再散列的方法处理冲突-This procedure enables the establishment of the hash table and re-hashing with linear probing method of dealing with conflict
hash
- 简单的HASH算法,使用的闭散列方法,是桶式散列,有需要的朋友可以-HASH algorithm is simple, using the closed hashing methods, is a barrel-style hash, you can see a friend in need
Peacock-Hash
- Peacock Hashing算法支持的一种网络结点排列研究。-Hashing is one of the most extensively studied and used algorithm. This paper shows us such a research that how to improve the performance of transforming data from a better network.
hashingin
- linear hashing class in java language
reverse_hashing
- 定义hash函数H=x N,假设用线性搜索来解决collision。算法实现的是根据hash table来重建输入序列。-reconstruct the input sequence according to the given hash table. The hashing function :H(x)=x N,and using linear probing to solve collisions.