搜索资源列表
Kademlia
- Kademlia协议(以下简称Kad)是美国纽约大学的PetarP. Maymounkov和David Mazieres. 在2002年发布的一项研究结果《Kademlia: A peerto -peer information system based on the XOR metric》。 简单的说,Kad 是一种分布式哈希表(DHT)技术,不过和其他 DHT 实现技术比较,如 Chord、CAN、Pastry 等,Kad 通过独特的以异或算法(XOR)为距离度量基础,建立了一种 全
MD5
- MD5用的是哈希函数,在计算机网络中应用较多的不可逆加密算法有RSA公司发明的MD5算法和由美国国家技术标准研究所建议的安全散列算法SHA。-MD5 hash function is used in the application of computer networks more irreversible encryption algorithm invented by RSA, MD5 algorithm and by the National Institute of Standards
SHA1
- 安全哈希算法(Secure Hash Algorithm)主要适用于数字签名标准(Digital Signature Standard DSS)里面定义的数字签名算法(Digital Signature Algorithm DSA)。-Secure Hash Algorithm (Secure Hash Algorithm) is mainly applied in the Digital Signature Standard (Digital Signature Standard DSS) w
securable
- hash解码软件 很好用的一款软件-hash decoding software is useful for a software
CheckFile
- 文件的哈希值校验,文件比较源代码。判断是否为同一文件-an demo of files Hash check.
md5v12005
- md5 hash generator and viewer
htable.tar
- 一个纯C实现的哈希表示例代码,实现了通用哈希表的创建、查找、添加、删除、销毁等功能。-A pure C implementation of the hash code that patients achieve a common hash table to create, find, add, delete, destroy and other functions.
3Web_dictionary
- C#实现在线字典,web dictionary实现,可自动加载字典,并采用哈希生成自己的小字典便于查询,利用哈希和顺序两种算法查询并比较其查询时间效率-C# achieve online dictionary, web dictionary implementation, can automatically load the dictionary, and the hash generated by a small dictionary to facilitate their inquiries
LZW
- 基于LZW字典编码的压缩解压算法,动态建立编译表并用哈希表结构存储索引。-Dictionary-based LZW compression decompression coding algorithm, dynamic compilation table set up and use the hash table structure to store the index.
uthash-1.9.3
- 最新的 uthash 只需要将一个头文件添加到你的项目中就可以实现hash的增,删,改查!-The latest uthash only need to add a header file to your project, the increase can be achieved hash, delete, change check!
C
- 上传的文件包含6个: 计算器、二叉树、排序、哈希查找、图的遍历和最小生成树。-Upload file contains 6: calculator, binary tree, sorting, hash search, graph traversal and the minimum spanning tree.
HashDelphi
- Hash function on Delphi
ElGamal
- Elgamal签名是基于离散对数问题的,首先选择p,g计算出B,作为公钥(p,g,B),在选择一个a作为私钥,给出明文m,对明文机型加密,计算出x,y,得到签名,接收方就可以进行验证。签名过程中必须使用Hash函数,否则的话容易受到存在性伪造攻击,并且签名长度是明文长度的二倍。 -Obtained by the Elgamal discrete logarithm problem cryptographic algorithms, first, Elgamal key generation,
crc_verilog_xilinx
- 各类CRC效验码 有CRC8-8 CRC16-8 CRC32-8 CRC12-4 CRC-CCIT-8-CONTAIN CRC8-8 CRC16-8 CRC32-8 CRC12-4 CRC-CCIT-8
music
- 运用STC单片机实现凑乐 “祝你生日快乐” 程序主要由 音阶和音乐 两部分组成-STC MCU using hash Music " Happy Birthday to You" program mainly by the scales and music composed of two parts
openSubtitle_hash
- opensubtitle.org hash algo written in masm
HashtabledatastructuretoachieveContacts
- 用哈希查找实现通讯录,内容包括添加,删除,修改,查找等-Achieved with the hash to find contacts, including add, delete, modify, search, etc.
MD5
- MD5程序,可以计算MD5算法得到的Hash值,且可以保存成文档-MD5 program can calculate MD5 Hash value obtained by the algorithm, and can be saved into a document
hashMap
- 数据结构中的哈希查找,首先先插入n个数据,然后按值可以查找,并显示位置-Find the hash data structure, the first n-first into the data, and then you can find by value, and display position
rfc5106.txt
- This document specifies EAP-IKEv2, an Extensible Authentication Protocol (EAP) method that is based on the Internet Key Exchange (IKEv2) protocol. EAP-IKEv2 provides mutual authentication and session key establishment between an EAP peer and an