Hash Algorithms

本網站之附件檔案使用雜湊編碼演算方式,以驗證該檔案是由本網站所提供,未經惡意竄改。您可下載驗證工具,透過工具計算檔案的雜湊值與本網站所標示的雜湊值驗證碼進行比對(請使用「SHA256」驗證),謝謝您。

We use hash algorithms to make sure that an attachment is the one we directly provide to users and that it has not been maliciously changed by others. You may use a verification tool to see if an attachment’s hash value matches its hash verification code listed on this website (please remember to use SHA-256). Thank you.

No File Name Hash Verification Code
1 TIGF簡介英文稿-v2.pdf B43D07AFC4EB548506FE3FB23CE34234774FF935CC53C3788FB4FA1DCD08662C