搜索资源列表
sound-secure
- secure sound hashing
HEAPSORT
- 在计算机内部排序的各种算法中 ,用比较大小的方法进行排序时间耗费的最好特性为 O(nlog2 n) ,最坏情况下还会上升到 O(n2 ) [1] 。要达到其理论下界log2 n1≈ nlog2 n- 1.4 4 n是非常困难的。Hashsort 一种散列排序方法-The best features of the computer' s internal sorting algorithm, the sort of time-consuming method of comparative s
DEC_5.2
- Encryption, hashing and compression library for delphi.
ketama
- 一致性哈希算法(Consistent Hashing Algorithm)是一种分布式算法,常用于负载均衡。Memcached client也选择这种算法,解决将key-value均匀分配到众多Memcached server上的问题。它可以取代传统的取模操作,解决了取模操作无法应对增删Memcached Server的问题(增删server会导致同一个key,在get操作时分配不到数据真正存储的server,命中率会急剧下降),-Consistency hash algorithm (Cons
wp512
- Whirlpool hashing Algorithm for linux v3.0.1
Hashing(MD5-SHA1)
- MD5 and SHA encryption in ASP.net by mehdi akbari PhD student in QIAU Iran
tgr192
- Tiger hashing Algorithm for linux.
ip_vs_dh
- IPVS: Destination Hashing scheduling module driver
hmac
- Keyed-Hashing for Message Authentication (RFC2104).
ip_vs_sh
- Source Hashing scheduling module driver
datar-slides.pdf
- Locality Sensitive Hashing
frag1
- This program prepares the input to gperf for hashing IIDs.
Comparison-Based-Analysis-of-Different-Cryptograp
- Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of techn
hashtable
- 用再散列法完成单词的平均查找次数,可以实现查找,插入,删除的基本功能-Complete with re-hashing the word average search times can be achieved search, insert, delete the basic functions
hashtable
- 多种散列存储方式的效率分析,包含闭散列,开散列,桶扩充-Multiple hash storage efficiency analysis, including closed hashing, open hash bucket expansion
linearHashingJava
- 线性散列的java实现,包括线性散列的介绍、实现步骤方法等。-Linear hashing java, including the introduction of linear hashing, implementation steps methods.
encrypt_algorithms
- 信息安全课程的实验,含AES、DES、RSA三个加密算法和MD5、SHA-1两个哈希算法的C/C++源代码,可以加密字符串和文件。-Information Security course experiments, including AES, DES, RSA three encryption algorithms and MD5, SHA-1 hashing algorithm for two C/C++ source code, you can encrypt strings and fil
zhiluan
- 是水印中用到的各中置乱算法的具体实现,申明一下,不是本人写的-Is the watermark used in the hashing algorithm in the concrete realization, affirm what is not written in my
address-list
- 算法课程设计中的用散列法构建通讯录,设计散列表实现通讯录查找系统。-Curriculum design algorithm built using hashing address book, address book designed to achieve a hash table lookup system.
High-Throughput-Hardware_Software-Co-Design-Appro
- High Throughput Hardware_Software Co-Design Approach for SHA-256 Hashing Cryptographic Module In IPSec_IPv6