切换至中文 Over 1 million code package, 10 million code file free download
  • [Others] 2.rar ... tag bearers, and then a digital Codec for RFID tag is designed based on the protocol. The protocol which uses cryptographic hash algorithm is based on a three-way challenge response authentication scheme. In addition, we will show how the three ...
    Category: RFID Upload User:lyj527621 Size:228K
  • [Visual C++ (VC++)] 09.rar Hash table implementation to describe the design problem to find the system address book, bringing the average search length of no more than 2 to complete the construction of the corresponding table and look-up table procedures.
    Category: Project Design Upload User:jenking666 Size:471K
  • [C++ Builder] CBuilder.rar ... (tree, list, single list, double-linked list, a red, black tree, Quick Sort, Bubble Sort, Kazakhstan furman tree, heap, collection, dictionary, hash, dictionary, jump tables, maps, shortest path, and so on 。。。。) sort of all-source data structure!!!
    Category: Other systems Upload User:laserstone Size:1632K
  • [Visual C++ (VC++)] test_hash.rar Data Structures and Algorithms- procedures, materials to create the hash object and find
    Category: Windows Develop Upload User:changye3 Size:1K
  • [C/C++] shujujiegou.rar Some simple small programs, such as Havermann editor, minimum spanning tree, hash table design and implementation, etc.
    Category: Data structs Upload User:nhxgdz Size:37K
  • [Visual C++ (VC++)] MyMD5.rar information security encryption algorithm MD5 hash using C language programming
    Category: Crypt_Decrypt algrithms Upload User:olyson Size:6K
  • [Others] donalde.knuth-theartofcomputerprogramming ... . The book including computer methods carefully examined the options, and its efficiency lot of analysis. The book version of the unique features of the optimization is sorted, and right hash law and common law with the new theoretical expositions.
    Category: Data structs Upload User:lcxqgg Size:15787K
  • [Visual C++ (VC++)] Md5Encrypt.zip ... process the input information, and each group was again divided into 16 32-seat group, after a series of processing, the algorithm' s output consists of four 32-bit group composed of these four 32-bit Cascade Group will generate a 128-bit hash value.
    Category: Crypt_Decrypt algrithms Upload User:cqmqblg Size:47K
  • [Java/JSP] MD5Encode.rar Java 16 md5 generator
    Category: Java Develop Upload User:gzluxled Size:1K
  • [C/C++] data_structure.rar Data structure the most frequently used, including the list, double linked lists, binary tree, balanced binary tree, hash table, etc.
    Category: Data structs Upload User:czyhb808 Size:16K