[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] hacker, roles hardware, resource restrictions Hash class hash codes [See also hashing algorithms] cryptography digital signatures generating from data in memory from streamed data keys parsing validating hash functions, cryptography HashAlgorithm class methods and properties HashCore method, implementing HashFinal method, implementing hashing algorithms abstract classes extending .NET Framework generating from data in memory from streamed data hash codes creating lengths of implementation classes testing Initialize method instantiating keyed block cypher hash codes creating HMAC standard .NET Framework KeyedHashAlgorithm class creating keyed hash codes instantiating message size limits .NET Framework programming considerations HashSize property, implementing HMAC standard (keyed hashing algorithms) HMACSHA1 algorithm host evidence ControlEvidence permission hostEvidence argument, Evidence class |