搜索资源列表
numerical-recipe-code3
- 剑桥数据库源代码,包括fourier、fred_singular、hash算法等-Cambridge database source code, including Fourier fred_singular hash algorithm
quickHash
- 几大最经典算法之快速hash算法的具体实现过程,同时包括了测试的代码-Most classic algorithm hash algorithm specific implementation process, including test code
simhash.tar
- 基于BKDR的字符串hash算法 & SimHash算法-Based BKDR string hash algorithm and SimHash algorithm
suanfa
- 这是综合算法设计的实验,包括了冒泡排序,哈希排序,插入排序,基数排序等十种排序的实验-This is an integrated algorithm design of experiments, including a bubble sort, hash sort, insertion sort, radix sort and ten other sort of experiment
Hash_MFC
- 哈希表的实现,mfc可视化编程实现,学习数据结构-Hash table implementation, mfc visual programming, learning data structures
hashtable
- 哈希表函数,纯C语言编写的哈希表计算函数-Hash table functions, written in pure C language function to calculate the hash table
outline
- 哈希表函数,纯C语言编写的哈希表计算函数-Hash table functions, written in pure C language function to calculate the hash table
xmlfileop
- 哈希表函数,纯C语言编写的哈希表计算函数-Hash table functions, written in pure C language function to calculate the hash table
_MD5
- MD5以512位分组来处理输入的信息,且每一分组又被划分为16个32位子分组,经过了一系列的处理后,算法的输出由四个32位分组组成,将这四个32位分组级联后将生成一个128位散列值-MD5 deal with the information entered, and each group was divided into 16 groups of 32 seats, after a series of processing, the output of the algorithm consis
Hash_string
- Hash Strin, hash table algorithm, vs C-Hash Strin, hash table algorithm, vs C++
fsumfrontend-1.5.5.1-src
- Fsum Frontend is a files integrity checker. It can calculate 96 hash and checksum algorithms(CRC32, MD5, SHA1, SHA2, ADLER, DHA256, FORK256, ...). You can verify your files using a .sfv/.md5/.sha1/.sha2 file or create your own checksum file.
Interface-For-DESRSA-And-SHA
- 三种算法,写了个统一接口调用。SHA、DES、RSA。一些地方借鉴了别人的写法。 SHA:安全哈希算法 DES:入口参数有三个:Key、Data、Mode-Three algorithms, wrote a unified interface. SHA, DES, RSA. Some places borrow writing. SHA: a secure hash algorithm DES: entrance there are three parameters:
one
- 此为简单的哈希算法查找,通过给的数查找给定的数据群里是否有这个数-This is a simple hash algorithm to find the number given this number by looking whether the group given data
fips180-2
- sha1 sha256 sha384 sha512算法描述及实例-SECURE HASH STANDARD