-
-
[
Others]
2.rar
... tag bearers, and then a digital Codec for
RFID tag is designed based on the protocol. The
protocol which uses cryptographic hash algorithm is
based on a three-way challenge response
authentication scheme.
In addition, we will show how the three ...
Category:
RFID Upload User:
lyj527621 Size:
228K
-
[
Visual C++ (VC++)]
09.rar
Hash table implementation to describe the design problem to find the system address book, bringing the average search length of no more than 2 to complete the construction of the corresponding table and look-up table procedures.
-
[
C++ Builder]
CBuilder.rar
... (tree, list, single list, double-linked list, a red, black tree, Quick Sort, Bubble Sort, Kazakhstan furman tree, heap, collection, dictionary, hash, dictionary, jump tables, maps, shortest path, and so on 。。。。) sort of all-source data structure!!!
-
-
[
C/C++]
shujujiegou.rar
Some simple small programs, such as Havermann editor, minimum spanning tree, hash table design and implementation, etc.
-
-
[
Others]
donalde.knuth-theartofcomputerprogramming
... . The book including computer methods carefully examined the options, and its efficiency lot of analysis. The book version of the unique features of the optimization is sorted, and right hash law and common law with the new theoretical expositions.
-
[
Visual C++ (VC++)]
Md5Encrypt.zip
... process the input information, and each group was again divided into 16 32-seat group, after a series of processing, the algorithm' s output consists of four 32-bit group composed of these four 32-bit Cascade Group will generate a 128-bit hash value.
-
-
[
C/C++]
data_structure.rar
Data structure the most frequently used, including the list, double linked lists, binary tree, balanced binary tree, hash table, etc.