# Hash table example in c

The following C project contains the C source code and C examples used for hash table example. This code is a class structure and main driver program
that's an example of using a hash table.

The following C project contains the C source code and C examples used for crypt unix api function. Crypt Unix API function
Algorithm:
The salt introduces disorder in the DES algorithm in one of 16777216 or
4096 possible ways (ie.

The following C project contains the C source code and C examples used for to crypt a file. My code opens a TxtFile an crypts Byt fpr Byt.

The following C project contains the C source code and C examples used for naek's encrypt algorithm (4pincode.cpp). get your pin code from seven's character you've entered

The following java project contains the java source code and java examples used for message digest applet. How to use the Java Security Class to hash passwords before storing them in a database

The following java project contains the java source code and java examples used for hash calculator. This application calculates 3 hash values for a specified file.

The following java project contains the java source code and java examples used for java general purpose hash function algorithms. The General Hash Function Algorithm library contains implementations for a series of commonly used additive and rotative string hashing algorithm in the Java programming language.
For more information please visit: http://www.partow.net/programming/hashfunctions/index.html

The following Matlab project contains the source code and Matlab examples used for directory traversal and duplicate file deletion using the sha 256 hash.
PURGETREE - On Windows systems, rapidly identifies duplicate files in an entire directory tree using the SHA-256 hash algorithm, then creates and executes a batch file to rapidly delete all but one of the duplicates.

The following Matlab project contains the source code and Matlab examples used for use a hash table.
Class Hashtable offers Matlab users access to the hash table data structure.

The following Matlab project contains the source code and Matlab examples used for runs a simulation of the wwii-era german enigma machine. .
Runs a simulation of the WWII-era German Enigma machine. Lets the user edit the encryption parameters and encrypt entire text files.

The following Matlab project contains the source code and Matlab examples used for hash table declaration.
H = hash;
H('key') = value; %assign value to key
v = H('key'); % retrieve value for a key
H.

The following Matlab project contains the source code and Matlab examples used for string2hash.
This function generates a hash value from a text string
hash=string2hash(str,type);
inputs,
str : The text string, or array with text strings.

The following Matlab project contains the source code and Matlab examples used for sha algorithms 160,224,256,384.512.
Generates Message Digest using algorithms : SHA160, SHA-224, SHA256,SHA384,SHA512
Support for Bit Oriented Message
-- Enter Message Length in Bits
-- Either enter Message (HEX) or
-- generate a random message of length LEN in Bits
-- Select the Algorithm to generate MESG DIGEST
LEN :: Enter Bit Oriented Message Length
should be GT 0

The following Matlab project contains the source code and Matlab examples used for generate digital signature of images.
Calculates the Digital Signature of a true-color image,
Using the SHA algorithm
%function [digest, MSG_PADDED] = image_hash(V_LEN,H_LEN,METH,IMG_FILE)
%Generates IMAGE Digest or HASH using algorithms : SHA1, SHA-224, SHA256
%Uses matlab program "hash.

The following Matlab project contains the source code and Matlab examples used for hmac hash message authentication code function.
HMAC(key,message,method)
INPUT
key: input secret key in char
message: input message in char
method: hash method, either:
'SHA-1', 'SHA-256', 'SHA-384', 'SHA-512'
OUTPUT
HMAC: Hash message authentication code value in upper case HEX.

The following Visual Basic project contains the source code and Visual Basic examples used for hashing (one way encryption) algorithm.

The following Visual Basic project contains the source code and Visual Basic examples used for sha-256 one way encryption: vb and asp implementation. The zip file contains both a VB and a VBScript (ASP) implementation of the SHA-256 one-way encryption algorithm, which is one of the industry standard methods for generating digital signatures.

The following Visual Basic project contains the source code and Visual Basic examples used for set operations, psi function and hash tables. With this project, you can have Union, Intersection, Difference, Complement, Addition, Cartesian Product and etc.

The following Visual Basic project contains the source code and Visual Basic examples used for generate all possible passwords of a given length. This program lets you create all of possible passwords with the series of characters given. It also calculates the remained and total time.

The following Visual Basic project contains the source code and Visual Basic examples used for a c# overloaded method to calculate an md5 hash. This snippet calculates the MD5 has of a given string and optionally accepts the encoding type to use.