搜索资源列表
TestAnnotation1
- Implements the Counter with Cipher Block Chaining mode (CCM) detailed in NIST Special Publication 800-38C.
RAck
- Product of NIST/ITL Advanced Networking Technologies Division (ANTD).
DialogFilter
- Product of NIST/ITL Advanced Networking Technologies Division (ANTD).
RFC3394WrapEngine
- an implementation of the AES Key Wrapper from the NIST Key Wrap Specification as described in RFC 3394.
Release
- 闲时无聊,搭了一个基于深度神经网络的手写数字识别系统。该系统在手写数字数据库mnist测试达到了99.22 的准确率。整个系统基于C++开发,可以很方便的移植到其他平台。 其中手写数字数据库mnist(http://yann.lecun.com/exdb/mnist/),有60000个训练样本数据集和10000个测试用例。它是由Google实验室的Corinna Cortes和纽约大学柯朗研究所的Yann LeCun建立的一个手写数字数据库。同时它是nist数据库的一个子集。
aaes
- AES is based on the Rijndael cipher developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, who submitted a proposal to NIST during the AES selection process. Rijndael is a family of ciphers with different key and block sizes. F
elf_user
- Pseudo Random Number Generator Based on NIST Recommended PRNG From ANSI X9.31 Appendix A.2.4 using AES 128 cipher for Linux.
SP800-145
- NIST对于云计算的定义,给出了云计算的概念、服务模式和部署模式-NIST definition of cloud computing, the concept of cloud computing service models and deployment models
NISTObjectIdentifiers
- NIST Object Identifiers Source Code for Linux.
GCMBlockCipher
- Implements the Galois Counter mode (GCM) detailed in NIST Special Publication 800-38D.
NistSipMessageFactoryImpl
- Implements all the support classes that are necessary for the nist-sip stack on which the jain-sip stack has been based.
ColorFilter
- an implementation of the AES Key Wrapper from the NIST Key Wrap Specification.
MockShortcutRepository
- The stack calls the message log factory to create logging records. The default implementatation of this interface can be replaced using the gov.nist.javax.sip.LOG_RECORD_FACTORY property.
Set_FDCC_LGPO-source
- Set_FDCC_LGPO is a non-interactive tool that applies the Q1 2009 FDCC desktop policy settings from NIST to local group policy and optionally to the security settings of the computer as well. The log file output can be used as input to the Apply_LGPO_
SHA
- SHA-1 produces a message digest based on principles similar to those used by Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design.SHA-2 is a set of cryptographic hash functions (SHA-22
sha1_v01
- sha1_testbench.v -- Testbench with vectors NIST FIPS 180-2 sha1_exec.v -- Top level sha1 module sha1_round.v -- primitive sha1 round dffhr.v -- generic parameterizable D-flip flop library Performance Analysis Performance equa
AddNoiseFANT.m
- add noise to nist sph files using fant
Advanced-Encryption-Standard
- AES is the Advanced Encryption Standard, a United States government standard algorithm for encrypting and decrypting data. The standard is described in Federal Information Processing Standard (FIPS) 197.1 On January 2, 1997, The National Instit
NS-2_Release_2_6_Documentation.pdf.tar
- tutorial de NIST qui explique l implementation de wimax pour NS2
SHA1Tool
- SHA-1 is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST