- XCS1.2 Simple GA code (Pascal code from Goldberg
- 514613687 实现语音通信功能 实现异地的两个人的语音通信息的能力
- S15HashTable Collision list Hash table
- matlab-homework1 MATLAB作业一 分别用for和while循环结构编写程序
- subsetter This will use the list of cmap ids and try to place each one specified into the subsetted font.
- psludo Talking about the System Shutdown()
资源列表
ECCEllipticCurveDigitalSignatureAlgorithm
- 椭圆曲线加密机制的数字签名 椭圆曲线加密机制的数字签名-ECC Elliptic Curve Digital Signature mechanism of digital signature encryption mechanism
EllipticCurveDigitalSignatureAnalysisandDesign
- 椭圆曲线的数字签名的分析与设计 椭圆曲线的数字签名的分析与设计-Elliptic Curve Digital Signature Analysis and Design
BaseEllipticCurveDigitalSignatureAlgorithm
- 基于椭圆曲线加密的数字签名 基于椭圆曲线加密的数字签名-Encryption Based on Elliptic Curve Digital Signature Based on Elliptic Curve Digital Signature Encryption
EllipticCurveDigitalSignatureAlgorithm
- 椭圆曲线数字签名算法 椭圆曲线数字签名算法-EllipticCurveDigitalSignatureAlgorithm EllipticCurveDigitalSignatureAlgorithm
chapter1courseinformation
- 这是有关网络安全的教案与PPT文件,我们老师做的很好,可以参考一下。-It is about network security, lesson plans and PPT files, we do a very good teacher, you can reference
computerandnetworksecurity
- 此为本人的网络安全技术上的有关加密解密算法的一个课程设计。-This is my network security technology to the encryption and decryption algorithms of a course design.
cash
- Cash Program for Managing Money
omziff
- hi this good programing-hi this is good programing
MD5
- C++ 语言MD5 加密算法实现源代码。-The c++ language MD5 encryption algorithm realized the source code.
g_tea
- Based on the key material generated 3584 Round table of the sample plug and a length of 256 x kb. Key schedule includes pre-encryption round key encryption procedure. Encryption is technology-dependent data permutations, sampling subkey for subblock
libcartman_2ddp3
- The source code of the implementation of a symmetric cryptographic algorithm block Cartman-2DDP3 language Pascal / Delphi. The algorithm processes the blocks of 128-bits. The default key size is 512 bits, allowed 256 and 384 bit keys. For 512 b
gtea
- Based on the key material generated 3584 Round table of the sample plug and a length of 256 x kb. Key schedule includes pre-encryption round key encryption procedure. Encryption is technology-dependent data permutations, sampling subkey for subblock