CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 源码下载 系统编程

资源列表

  1. q1

    0下载:
  2. Consider an organization with three roles: A, B and C. Whenever B has to issue some instruction to A, B has to take permission via C and then only it will be obeyed by A. This permission is issued with the help of a digital signature. A verifies
  3. 所属分类:CA program

    • 发布日期:2017-12-12
    • 文件大小:547byte
    • 提供者:jitender grover
  1. diffie_hellman

    0下载:
  2. Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random number mod p. Now generate A,
  3. 所属分类:CA program

    • 发布日期:2017-12-12
    • 文件大小:676byte
    • 提供者:jitender grover
  1. discrete_log

    0下载:
  2. Solve descrete log problem using meet in the middle attack. More formally, write a program to compute discrete log modulo a prime p. Let g be some element in Z p and suppose you are given h in Z p such that h = gx where 1 ≤ x ≤ 240. Your goal
  3. 所属分类:CA program

    • 发布日期:2017-12-12
    • 文件大小:873byte
    • 提供者:jitender grover
  1. 4

    0下载:
  2. Cryptographic Hash Functions: A cryptographic hash function must have at least two security properties: collision free and Hiding. Collision free property ensures that for a given function H, no one can find x and y such that H(x) = H(y). The hid
  3. 所属分类:CA program

    • 发布日期:2017-12-14
    • 文件大小:597byte
    • 提供者:jitender grover
  1. prob3

    0下载:
  2. Miller-Rabin test is a primality test algorithm which determines whether a given number is prime or not. Implement Miller-Rabin primality test as given in the text book page 257, Algorithm 7.44. (aN− 1 6= 1 mod N) Write three functions to
  3. 所属分类:CA program

    • 发布日期:2017-12-11
    • 文件大小:598byte
    • 提供者:jitender grover
  1. 9053818

    0下载:
  2. RandomAccessFile 对文件操作,很好用的哟,不错的东西-RandomAccessFile for file operations, very useful yo, nice stuff
  3. 所属分类:Network Security

    • 发布日期:2017-12-16
    • 文件大小:2kb
    • 提供者:ZOJkrux$9137
  1. sbzrcecode

    0下载:
  2. mybatis-generator-core-1,3,2 Java source code-Mybatis generator- core- 1 31 Java source code
  3. 所属分类:Network Security

    • 发布日期:2017-12-14
    • 文件大小:251.09kb
    • 提供者:Caesbr
  1. AKS

    0下载:
  2. Implement AKS algorithm for primality testing, which was the first polynomial time primality test that was devised. Read the paper attached and implement the main algorithm. Implement for numbers of size max 64 bits. Bonus marks will be given,
  3. 所属分类:Exploit

    • 发布日期:2017-12-12
    • 文件大小:1.01kb
    • 提供者:jitender grover
  1. 3870770

    0下载:
  2. Get examples of windows system related information-The Get examples of Windows system related information
  3. 所属分类:Network Security

    • 发布日期:2017-12-17
    • 文件大小:13kb
    • 提供者:preymwtion
  1. specifmed

    0下载:
  2. Data sorting example source code a series with the mouse to click header can sort the columns specified Java source code
  3. 所属分类:Network Security

    • 发布日期:2017-12-13
    • 文件大小:9.48kb
    • 提供者:HNkec+6298
  1. tjhom

    0下载:
  2. JSP built-in object _over JSP内置对象_over-JSP built- in object _over the JSP _over built-in objects
  3. 所属分类:Network Security

    • 发布日期:2017-12-18
    • 文件大小:559kb
    • 提供者:mukehbz
  1. thytestdngDLL

    0下载:
  2. dll测试的文件可以把dll文件的效果进行查看,效果很好的-DLL file testing can be see the effect of the DLL, the effect is very good
  3. 所属分类:Network Security

    • 发布日期:2017-12-19
    • 文件大小:1kb
    • 提供者:flopay
搜珍网 www.dssz.com

浏览历史记录

关闭