[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
hacker, roles
hardware, resource restrictions
Hash class
hash codes
[See also hashing algorithms] cryptography
digital signatures
generating from data in memory
from streamed data
keys
parsing
validating
hash functions, cryptography
HashAlgorithm class methods and properties
HashCore method, implementing
HashFinal method, implementing
hashing algorithms
abstract classes
extending .NET Framework
generating from data in memory
from streamed data
hash codes creating
lengths of
implementation classes
testing
Initialize method
instantiating
keyed
block cypher hash codes
creating
HMAC standard
.NET Framework
KeyedHashAlgorithm class creating keyed hash codes
instantiating
message size limits
.NET Framework
programming considerations
HashSize property, implementing
HMAC standard (keyed hashing algorithms)
HMACSHA1 algorithm
host evidence
ControlEvidence permission
hostEvidence argument, Evidence class
|