登录
首页 » Java » hash

hash

于 2009-01-09 发布 文件大小:6KB
0 108
下载积分: 1 下载次数: 8

代码说明:

  (1)为班级学生花名册建立开桶或闭桶散列表。 (2)友好性:界面要友好,输入有提示,尽量展示人性化。 (3)可读性:源程序代码清晰、有层次。 (4)健壮性:对输入的数据有纠错处理。((1) class roster for the establishment of open or closed barrels barrels hash table. (2) friendly: the interface should be friendly, to bring in people with tips, try to show humanity. (3) readability: source code clear, there are levels. (4) robustness: the input data are error-correcting processing.)

文件列表:

hash.doc

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论


0 个回复

  • WindowsFormsApplication2
    说明:  采用轮询机制,对数据库中数据进行加密处理(Using polling mechanism to encrypt data in database)
    2020-06-18 14:20:01下载
    积分:1
  • PolarSSL-简单、 安全的通信
    PolarSSL 使琐细便于开发者在他们 (嵌入式) 的产品,包括加密和 SSL/TLS 的能力促进这一功能与最小编码的足迹。
    2022-08-08 05:54:35下载
    积分:1
  • GOSTDSA算法的Pascal实现和例子,包括签名和确认
    GOSTDSA算法的Pascal实现和例子,包括签名和确认-GOSTDSA the algorithm Pascal realization and the example, including sign and confirmed
    2023-01-19 23:05:03下载
    积分:1
  • C++ implementaion for RSA together with the Wiener attack. It uses NTL librar...
    C++ implementaion for RSA together with the Wiener attack. It uses NTL library for big numbers
    2023-01-04 06:30:03下载
    积分:1
  • topic
    DES加密算法的VHDL和VERILOG源程序- Xilinx开源共享61EDA代码工厂(DES encryption algorithm of VHDL and VERILOG source code- Xilinx factory open source code sharing 61EDA)
    2010-05-24 17:32:39下载
    积分:1
  • encryption
    数字图象加密程序(编写的数字图象加密程序),仅供大家参考 (Digital image encryption procedure (prepared by digital image encryption procedures), only reference to U.S.)
    2008-03-27 21:47:39下载
    积分:1
  • hash算法的vb实现.很好用!
    hash算法的vb实现.很好用!-hash algorithm to achieve the vb. With good!
    2022-03-21 07:41:04下载
    积分:1
  • DSA数字签名
    dsa数字签名 系统功能需求: 1.对文件进行签名,生成一个独立于原文的签名文件; 2.可以对文件进行签名,在文件后追加签名信息; 3.具有密钥管理的功能,比如密钥的生成、导入、导出; 4.可以对word文档实施操作,对word文档的内容进行签名; 5.能够比对已经实施的签名,防止进行重复的签名,以防止重放攻击; 6.可以对已经签名的文件进行单独的源文件和签名信息的分离操作。(DSA digital signature System functional requirements: 1. Sign the document and generate a signature file independent of the original text. 2. The document can be signed and the signature information can be added after the document. 3. It has the function of key management, such as key generation, import and export. 4. Word documents can be operated and the contents of Word documents can be signed. 5. Ability to compare existing signatures and prevent duplicate signatures to prevent replay attacks; 6. It is possible to separate the source file from the signature information of the signed file.)
    2021-01-06 21:18:54下载
    积分:1
  • 详细的AESRSASHA1实现原理,其中RSA中内容自建的大书包。
    详细的AESRSASHA1实现原理,其中RSA中内容自建的大书包。-Detailed AESRSASHA1 Principle, in which the contents of self-RSA big bags.
    2023-08-30 02:35:03下载
    积分:1
  • permutation
    permutation image blocks encryption
    2014-06-24 15:48:09下载
    积分:1
  • 696518资源总数
  • 104591会员总数
  • 57今日下载