搜索资源列表
spider_v1.2
- 网络蜘蛛1.3版, 功能变更: 1. 关于对处理过URL和待处理URL的存储检索。 利用文件系统存储这些信息,利用Hash碰撞分页算法,加上最新数据的内存缓存,实现高效的信息检索。平均检索的效率0.01s 2. 修改前面版本URL替换产生的中文问题。 -network spider version 1.3, the functional changes : 1. On the right URL and processed pending the URL stora
des
- 技术说明,还有RSA算法、HASH算法、MD5、sha1RSA等的C源码.-technical note, RSA algorithm, hash algorithm, MD5, sha1RSA the C source.
jSecureKit
- 用图形用户界面编写的加解密文件系统,还可实现哈希函数算法-graphical user interface with the preparation of the increase declassified document systems, but also achieve hash function algorithm
hash.rar
- JAVA的哈希算法,非常适合初学者。 1. 直接寻址法2. 数字分析法3. 平方取中法 4. 折叠法5. 随机数法6. 除留余数法,JAVA hash algorithm is very suitable for beginners. 1. Direct addressing method 2. Digital analysis 3. Square to take the Sino-French 4. Folding Method 5. Random number method 6.
java_DigitalSign
- 实用数字签名的步骤 (1)发送方使用MD5算法对原始信息进行计算,获得一个固定长度的信息摘要 (2)发送方用自己的私钥加密生成的信息生成发送方的数字签名,发送方把这个数字签名作为发送信息的附件和明文信息,一同用接收方的公钥进行加密,将加密后的密文一同发送给接收方; (3)接收方首先把接收到的密文用自己的私钥解密,得到明文信息和数字签名,再用发送方的公钥对数字签名进行解密,然后使用相同的单向散列算法来计算解密得到的明文信息,得到信息摘要;对比计算出来的信息摘要和发送方发送过来的信息摘要
MD5Code
- 给大家写一个哈希算法实例,通过实例可以对文档进行哈希,生成一串哈希值。-For everyone to write a hash algorithm for example, through the examples of documents can hash to generate a string of hash value.
sha1
- SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-51
SHA
- hash算法 This VBscr ipt ASP file tests the accompanying SHA256.asp for generating digests of strings.-hash algorithm This VBscr ipt ASP file tests the accompanying SHA256.asp for generating digests of strings.
sha256.java
- Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
SHA1
- java语言编写的SHA散列算法,可以直接使用-java language SHA hash algorithm can be directly used
Advanced.Design.hash.algorithm.code.java
- java算法高级设计hash代码Advanced Design hash algorithm code java -Advanced Design hash algorithm code java
Advanced.Design.hash.algorithm.code.java
- java算法高级设计hash代码Advanced Design hash algorithm code java -Advanced Design hash algorithm code java
beansdb4j-1.0
- 这是beansdb的java客户端, 它使用了和python客户端一模一样的hash算法, 所以它和python客户端是完全兼容 — 这意味着你可以用python客户端存一个东西进beansdb, 然后用java客户端把它取出来。-This is beansdb the java client, it uses the same client and python hash algorithm, and python client is fully compatible- this means
ImageSearch
- JAVA图片比较,基于感知哈希算法,效果还可以-JAVA picture comparison, based on perceptual hash algorithm
hash_c
- hash算法C代码实现 标准接口函数 方便修改hash函数-hash algorithm C code implements the standard interface functions easily modified hash function
DigitalSignature
- This class represents Signature type, as described in TLS v 1.0 Protocol specification, 7.4.3. It allow to init, update and sign hash. Hash algorithm depends on SignatureAlgorithm.
crypto-sha1
- A Javascr ipt implementation of the Secure Hash Algorithm, SHA-1, as defined in FIPS PUB 180-1.
sha1
- SHA1 The SHA1 encryption algorithm specifies a Secure Hash Algorithm (SHA1), which can be used to generate a condensed representation of a message called a message digest. The SHA1 is required for use with the Digital Signature Algorithm (DSA)
sha256
- SHA 252 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the compu
sha512
- sha 512 SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data by comparing the compu
