[ Team LiB ]

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

hacker, roles 
hardware, resource restrictions 
Hash class 
hash codes  [See also hashing algorithms]
    cryptography 
    digital signatures 
    generating
        from data in memory 
        from streamed data 
    keys 
    parsing 
    validating 
hash functions, cryptography 
HashAlgorithm class
    methods and properties 
HashCore method, implementing 
HashFinal method, implementing 
hashing algorithms 
    abstract classes 
    extending .NET Framework 
    generating
        from data in memory 
        from streamed data 
    hash codes
        creating 
        lengths of 
    implementation classes 
        testing 
    Initialize method 
    instantiating 
    keyed 
        block cypher hash codes 
        creating 
        HMAC standard 
        .NET Framework 
    KeyedHashAlgorithm class
        creating keyed hash codes 
        instantiating 
    message size limits 
    .NET Framework 
    programming considerations 
HashSize property, implementing 
HMAC standard (keyed hashing algorithms) 
HMACSHA1 algorithm 
host evidence 
    ControlEvidence permission 
hostEvidence argument, Evidence class 

[ Team LiB ]