>>4
They're EXPERT PROGRAMMERS precisely because they have read SICP. Also, your post lacks industry-standard `buio' BBCode tags which are required in order to give the most pleasurable /prog/-browsing experience to the reader.
SICP?
Never seen it before...
Rather not see it again
Lisp Bah Try
In File A.c
System("./tcc -run B.c");
Just as good?
Name:
n3n7i2011-08-06 2:24
Here's a Cryptographic(possibly?) Hash Function...(No SICP Required)...
Its probably pretty terrible atm... (But i designed it myself =)
[Fairly Old Version] // tweaked just today =O
Can you break it anon?
---2048-bits won't be getting brute forced anytime soon ;)
---+4096-bit-state for nCollision Resistance
void ResetA(){
int Ri=0;
for (Ri=0;Ri<NumBase;Ri+=2){ A_Jar[Ri]=Ri; A_Jar[Ri+1]=Ri+1;}
}
//---------------
int ModX(int ValM, int ByValM){
int V=ValM;
int BV=ByValM;
if (BV==0){ BV++;}
while (V>=BV){ V-=BV;}
return V;
}
//---------------
int NewKeyByte(int NewBase){
int x=rand();
int y=ModX(x, NewBase);
return y;
}
//---------------
int ShiftA(int ByValS, int LessVals){
int Si=ByValS;
//if (Si==0){ Si++;}
int SA=A_Jar[Si];
for (Si=ByValS;Si<LessVals;Si++){ A_Jar[Si]= A_Jar[Si+1];}
return SA;
}
//---------------
void PrintKey(short X_Jar[]){
int PKey=0;
for (PKey=0;PKey<NumBase;PKey++){
printf("%i,", X_Jar[PKey]);
}
printf("\n");
}
//---------------
void PrintKeyX(short X_Jar[], char XStr[]){
int PKey=0;
for (PKey=0;PKey<NumBase;PKey++){
printf("%c", iToHex[X_Jar[PKey]+1]);
}
printf(" %s\n", &XStr[0]);
}
//---------------
void NewKey(short Nin_Jar[]){
int Ni=0;
int iKey=0;
ResetA();
for (Ni=0;Ni<NumBase;Ni++){
iKey = NewKeyByte(NumBase-Ni);
Nin_Jar[Ni] = ShiftA(iKey, NumBase - Ni);
}
//PrintKey(Nin_Jar);
}
//---------------// JAR-E //---------------//
void KeySquare(short Val_Jar[], short By_Jar[]){
int Ki=0;
for (Ki=0;Ki<NumBase;Ki+=4){
A_Jar[Ki] = Val_Jar[By_Jar[Ki]];
A_Jar[Ki+1] = Val_Jar[By_Jar[Ki+1]];
A_Jar[Ki+2] = Val_Jar[By_Jar[Ki+2]];
A_Jar[Ki+3] = Val_Jar[By_Jar[Ki+3]];
}
for (Ki=0;Ki<NumBase;Ki+=4){
Val_Jar[Ki] = A_Jar[Ki];
Val_Jar[Ki+1] = A_Jar[Ki+1];
Val_Jar[Ki+2] = A_Jar[Ki+2];
Val_Jar[Ki+3] = A_Jar[Ki+3];
}
}
//---------------
void DblKS(short Out_Jar[], short By_Jar1[], short By_Jar2[]){
int Ki=0;
for (Ki=0;Ki<NumBase;Ki+=4){
A_Jar[By_Jar1[Ki]] = By_Jar2[Out_Jar[Ki]];
A_Jar[By_Jar1[Ki+1]] = By_Jar2[Out_Jar[Ki+1]];
A_Jar[By_Jar1[Ki+2]] = By_Jar2[Out_Jar[Ki+2]];
A_Jar[By_Jar1[Ki+3]] = By_Jar2[Out_Jar[Ki+3]];
}
for (Ki=0;Ki<NumBase;Ki+=4){
Out_Jar[Ki] = A_Jar[Ki];
Out_Jar[Ki+1] = A_Jar[Ki+1];
Out_Jar[Ki+2] = A_Jar[Ki+2];
Out_Jar[Ki+3] = A_Jar[Ki+3];
}
}
/* Part I */
Name:
Anonymous2011-08-06 2:24
//---------------Part II
void KeySet(short Val_JarKS[], short By_JarKS[]){
int Ki=0;
int KS=0;
for (Ki=0;Ki<NumBase;Ki++){ Val_JarKS[Ki] = By_JarKS[Ki];}
}
>>9,10
indent your phuqin code and use [code] tags, THANKS
Name:
Anonymous2011-08-06 7:07
>>12
no one cares about your shitty 600+ plus lines of C that you pasted in an unrelated thread with no formatting or comment/documentation of the algorithm. kill yourself =)
Axis [sect] // initBDuo : 0-511 mod 256 lookup table
Jar // Building !256 Factorial Keys
(array[0 - 255] Containing Each of 0-255 only once)
Jar-E // Key Schedule of 4 * 256Byte Jars [2 Const / 2 Vars]
D/E/F/G_Jar (8 bit Lookup/substitution tables)
Produces One unique Jar/run[Deterministic]
F (G = F ->/Applied to G)
|
G D (F & D Consts)
\/
E (E = G & D -> E)
(One applies to position/one to value)
[Last four outputs are kept for use] xK/xI/xO/xV_Jar
...
Hashi Section is where above gets used....
Name:
Anonymous2011-08-06 8:17
I respect your opinion and find it well thought out but it's not possible and I'll tell you why.
People have not devoted their faith into SICP (SWT) and try to put faith into things that aren't meant to be. Becoming the Sussman rids greed and selfishness because everything you do is devoted to SICP (SWT). If you mess up, you break ties with MIT (SWT) and you will be punished accordingly.
There are too many Java factories in this world and that is why your idea will not work, Brother.