搜索资源列表
matlab源代码
- OBS汇聚算法,用matlab实现,该算法为混合门限汇聚算法-OBS aggregation algorithm, using Matlab realize that the algorithm for mixed Threshold aggregation algorithm
linuxstart
- linux入门介绍,是linux使用者不可多得的好助手-linux crosses the threshold the introduction, is the linux user s rare good assistant
hackbook
- 黑客教程.是一套从黑客入门一直教到很高层次的图书,比较适合菜鸟使用,如果是老鸟的 话,可以跳过一些章节,同样适用.- Hacker course Is a set crosses the threshold from the hacker continuously teaches the very high level the books, compared with suitable vegetable bird use, if is old bird s, may jump some
secretshare_VC++
- Shamir秘密分享与恢复算法的VC++程序,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再得出主密钥。输入大数长度和份数可自行定义(默认是270位和不超过20份)。-Shamir secret sharing and recovery algorithm VC procedures, is the use of the plane could be decided k k-1 power of the polynomi
secretshare_java
- Shamir秘密分享算法的java实现,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再求出主密钥。-Shamir secret sharing algorithm to achieve the java, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Applicati
Asmuth_Bloom
- Secret sharing consists of recovering a secret S from a set of shares, each containing partial information about the secret. Asmuth-Bloom s threshold secret sharing scheme.-Secret sharing consists of recovering a secret S from a set of shares, each c
Shamir
- Shamir秘密分享算法的C#实现,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再求出主密钥。-Shamir secret sharing algorithm to achieve the java, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application
PatternMatching
- 很经典的搜索图案匹配的代码,labwindows写的,可以设置阀值,匹配度,以及角度等, -Very classic patterns that match the search code, labwindows written, you can set a threshold, matching degree, as well as the point of view, etc.
Shamir
- Shamir Scheme. Implmentació a cryptographic protocol based on the threshold scheme.
cadence_multi-threshold
- linux下(fedora版本)的cadence中编译4位全加器的实现, 在不同的阈值电压调解下观察点路的总体power和速度,以及逻辑的正确性. 可能会用到NCSU的FREEPDF工具包-this is a package of three projects, low-vth, high-vth, and optimum architecture vth four bit full adder design. In the environment of Cadence and then sim
a51
- A5 is a stream cipher. A5 is based on a combination of three linear feedback shift registers (LFSRs) with irregular clocking. It uses 64 bit keys. The register lengths are 19, 22, and 23. All the feedback polynomials are sparse. The output is the XOR
510
- We show that an RSA private key with small public exponent can be eciently recovered given a 0.27 fraction of its bits at random. An important application of this work is to the \cold boot" attacks of Halderman et al. We make new observations ab
secret-sharing-scheme
- :利用椭圆曲线密码算法设计了一个新的1"3限多重秘密分享方案,该方案的特点是不需要秘密分发者事先给每个用户分发 一个子秘密.不需要安全信道传输信息,而且所有的中间信息都是不需要保密的-This paper proposes a new threshold multi-secret sharing scheme which is based on ECC.Th e scheme didn’t need give any secret inform ation to all users an
SendDataByClipboard
- 通过剪贴板进行进程间通信,源码很好,不错的参考-This is a threshold value of VC procedures, test pictures I do image processing of all mutual exchange it
voice059
- 自己编的双门限静音检测c代码,在信噪比不算太低的情况下 还是很准确的 -C code of their own series of dual threshold silence detection, signal to noise ratio is not too low or very accurate
Threshold
- 边缘检测程序,很不错的应用matlab程序-Edge detection process, a very good application of matlab program
speex
- Speex工程着力于通过提供一个可以替代高性能语音编解码来降低语音应用输入门槛 。speex的java实现,C实现,手册-The Speex engineering efforts by providing an alternative to high-performance voice codec to reduce the voice applications, the input threshold. the java implementation of speex C implement
OtsuBIlevel
- Otsu bi level threshold function, using Opencv implemented in C.
RSA-SecretSharingScheme
- 于RsA密码体制,提出了一个新的(f,,1)门限秘密共享方案。在该方案中,秘密份额由各参与者自己 选择,秘密分发者不知道每个参与者所持有的份额,而且秘密份额长度与秘密长度相同。在秘密恢复过程中,每 个参与者能够验证其他参与者是否进行了欺骗。每个参与者只需维护一个秘密份额,就可以实现对多个秘密的共 享。方案的安全性是基于RSA密码体制和Shamir的(‘n)门限秘密共享方案的安全性。-Abstract:A new(f,n)thresh01d secret sharing scheme
Threshold-Autoregressive-Model
- MATLAB-门限协整自回归模型,操作简单,使用方便-Threshold Autoregressive Model
