Home - Sports - Hashing |
Page 2 21-40 of 168 Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next 20 |
21. Half-Mind Catalog: Information & Resources For Hash House Harriers Current and historical information on the Hash House Harriers, around the world, compiled from various sources. the best point of entry for hashing seems to be www.halfmind.com Mind Catalog http://www.half-mind.com/ | |
|
22. The Hashing Function Lounge The hashing Function Lounge. Welcome! 128132. NN91 NIST/NSA, FIPS 180 (supersededby FIPS 1801 and FIPS 180-2). See also NIST s Secure hashing site. http://planeta.terra.com.br/informatica/paulobarreto/hflounge.html | |
|
23. Encryption, Decryption, Activex, Component, Library, Rijndael, Twofish, RSA, Sec Provides data encryption and hashing services with supports for AES, Twofish, RSA, SHA2, and HAVAL algorithms. By Xceed Software Inc. Component, Commercial http://www.xceedsoft.com/products/Encrypt/ | |
|
24. Hash House Harriers Hash House Harriers, Atlanta, Georgia, Southern Comfort Hash House Harriers, Atlanta's SouthSide Hash House Harriers, shiggy, extreme hashing, jogging, beer drinking, singing, Knoxville, Tennessee http://www.onin.com/hhh | |
|
25. Video: Political Parties Already Hashing Out 2004 Primary Schedule - May 1, 2000 CNN http://www.cnn.com/2000/ALLPOLITICS/stories/05/01/video.woodruff/index.html | |
|
26. Calu's Macromedia Director Xtras Data Linker Xtra links Director to various data sources including Access and Excel. MD5 hashing Xtra encodes strings and files using the RSA MD5 Message Digest Algorithm. http://www.calu.us/xtras/ | |
|
27. A Brief History Of The Hash House Harriers MODERN HARRIERS. hashing in Kuala Lumpur was suspended during the World War IIoccupation by Japanese forces, but then reestablished after peace returned. http://harrier.net/presskit/shistory.html | |
|
28. Medussa: A Distributed Password Cracker A distributed password cracking tool for LAN environments supporting a multitude of hashing algorihms. http://www.bastard.net/~kos/medussa/ | |
|
29. Hashing? 2. A crosscountry runner. hashing? So you re interested in hashing. If you re seriousabout trying hashing come on out and join the fun! See you at the hash! http://harrier.net/primer/hashing.html | |
|
30. The Guide To Hashing In Japan, Hash House Harriers Join us! The Guide to hashing in Japan. This page last updated 20 February2004 Guide to hashing in Japan Webmaster@gotothehash.net. http://gotothehash.net/japan.html | |
|
31. Kuala Lumpur Mountain Bike Hash Club Homepage of the premier bike hash in Malaysia, the home of hashing. http://www.bikehash.freeservers.com | |
|
32. Hashing In Hanoi http://www.wso.net/hhhh/ | |
|
33. Network Working Group H. Krawczyk Request For Comments 2104 IBM Working Group H. Krawczyk Request for Comments 2104 IBM Category InformationalM. Bellare UCSD R. Canetti IBM February 1997 HMAC Keyedhashing for Message http://www.ietf.org/rfc/rfc2104.txt |
34. Eric Nusbaum Software :: Modern Applications For A Modern World Duplicate file remover implementation of both optical recognition and RSA MD5 hashing. Beta http://www.jpegduper.com/ | |
|
35. News: Encryption, Hashing, And Obfuscation Alerts, News Commentary, Encryption, hashing, and obfuscation. By work.Thats where encryption, hashing, and obfuscation come in. This http://zdnet.com.com/2100-1107-995962.html | |
|
36. The Beaver Parser Generator A LALR(1) parser generator. Uses very fast (based on perfect hashing) parsing engine. Open source, LGPL http://beaver.sourceforge.net | |
|
37. Data Structures And Algorithms Hash Tables 1) search time table. Unfortunately, finding a perfect hashing functionis not always possible. Rehashing. Re-hashing schemes use http://ciips.ee.uwa.edu.au/~morris/Year2/PLDS210/hash_tables.html | |
|
38. John The Ripper Password Cracker A portable password cracker with builtin efficient implementations of multiple password hashing algorithms found on various Unix flavors. Additionally supports Kerberos AFS and Windows NT LanMan hashes, plus more with contributed patches. Officially supported are most Unix-like systems, Win32, DOS. http://www.openwall.com/john/ | |
|
39. Data Structures And Algorithms: Hash Functions 8.3.3 hashing Functions. Choosing a good hashing function, h(k), is essential forhashtable based searching. h(k) = floor((mk)/r). will provide uniform hashing. http://ciips.ee.uwa.edu.au/~morris/Year2/PLDS210/hash_func.html | |
|
40. Homepage Of Søren Abildtrup My interests are computers, internet, fixing my car and hashing. http://www.checkmark.dk/sa/ | |
|
Page 2 21-40 of 168 Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next 20 |