Delphi Cryptographic API Hash example using MD2 MD4 MD5 SHA1 GOST
标签: Cryptographic example Delphi using
上传时间: 2017-03-11
上传用户:cazjing
简要论述了Linux下图形配置界面设计的Gtk+的技术原理。基于Gtk+库设计了数控机 床良好的人机操作界面,对其中的重点问题hash表和回调函数进行说明。
上传时间: 2017-03-12
上传用户:lanhuaying
Linux实现hash算法! 效率比较高。。。。。
上传时间: 2017-04-10
上传用户:cursor
一个分布式缓冲服务器中间件源码 包括一种解决冲突的hash算法和数据管理、数据容错模块
上传时间: 2014-01-16
上传用户:csgcd001
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.
标签: perceptual implementation algorithms fingerpr
上传时间: 2013-12-08
上传用户:星仔
SHA512 is a hash function. You can use sha512 with an asymetric method to sign a document.
标签: 512 asymetric function document
上传时间: 2017-04-22
上传用户:6546544
常用字符串hash算法,可以用于bloom算法,用于匹配
上传时间: 2014-01-02
上传用户:stvnash
彩虹表 crack-hash 破解密码 。。。。。
上传时间: 2017-04-26
上传用户:han_zh
SHA Hash algorithm. This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA- 512.
标签: SHA algorithms algorithm specifies
上传时间: 2014-01-01
上传用户:teddysha
hash算法中常见的一种,md5算法,在vc++中的源代码
上传时间: 2014-07-26
上传用户:invtnewer