搜索结果

找到约 205 项符合 Hash 的查询结果

加密解密 加密解密过程中非常著名的hash算法

加密解密过程中非常著名的hash算法,搜了好久才找到的
https://www.eeworm.com/dl/519/297728.html
下载: 77
查看: 1053

Java编程 简单的词频统计,利用java 实现,使用hash表

简单的词频统计,利用java 实现,使用hash表
https://www.eeworm.com/dl/633/312541.html
下载: 180
查看: 1130

VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/686/413130.html
下载: 134
查看: 1101

加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/519/413134.html
下载: 97
查看: 1093

数学计算 pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr

pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small chang ...
https://www.eeworm.com/dl/641/429179.html
下载: 51
查看: 1173

技术资料 基于局部签名Hash表的证书撤销列表方案

在大规模应用环境中,不合理的证书撤销方案会带来巨大的运算量和网络传输负担。该文分析几类主要的证书撤销列表(CRL)机制,提出PSHT-CRL方案,综合分段CRL、重定向CRL和重复颁发CRL方案的特点
https://www.eeworm.com/dl/904370.html
下载: 8
查看: 7313

技术资料 基于PayWord的自更新Hash链微支付协议

针对基于Hash 链的小额支付协议PayWord 在支付效率和安全性方面的不足,以及传统Hash 链的应用存在长度限制的问题,提出一种新的适用于移动电子商务认证与微支付的协议,包括“多面额”Hash
https://www.eeworm.com/dl/918233.html
下载: 7
查看: 8115

加密解密 提供rsa、 des、 md5等加密和hash算法

提供rsa、 des、 md5等加密和hash算法
https://www.eeworm.com/dl/519/128841.html
下载: 93
查看: 1106

数据结构 hash表和单向链表的实现代码,相当实用.

hash表和单向链表的实现代码,相当实用.
https://www.eeworm.com/dl/654/182067.html
下载: 144
查看: 1071

操作系统开发 一些经典的HASH函数及测试数据

一些经典的HASH函数及测试数据
https://www.eeworm.com/dl/531/222413.html
下载: 78
查看: 1064