搜索资源列表
nss-3.1.1.tar
- 支持SSL v2/v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509v3证书等安全协议或标准的开发库编译用到NSPR-Support for SSL v2/v3, TLS, PKCS# 5, PKCS# 7, PKCS# 11, PKCS# 12, S/MIME, X.509v3 certificate security protocols or standards used to develop database to co
CubicSpline
- Cubic spline algorithm approximating function y=f(x) - ((-2)*x*(2*x+3))/(x*x+4*x+5) in interval [-2 2]-Cubic spline algorithm approximating function y=f(x)- ((-2)*x*(2*x+3))/(x*x+4*x+5) in interval [-2 2]
zl_sql
- 美国国家标准局1973年开始研究除国防部外的其它部门的计算机系统的 数据加密标准,于1973年5月15日和1974年8月27日先后两次向公众发出了 征求加密算法的公-14,4,13,1,2,15,11,8,3,10,6,12,5,9,0,7, 0,15,7,4,14,2,13,1,10,6,12,11,9,5,3,8, 4,1,14,8,13,6,2,11,15,12,9,7,3,10,5,0, 15,12,8,2,4,9,1,7,5,11,3,14,10,
code
- C# (pronounced "C Sharp") is a multi-paradigm programming language encompassing imperative, functional, generic, object-oriented (class-based), and component-oriented programming disciplines. It was developed by Microsoft within the .NET initiative a
code245
- C# (pronounced "C Sharp") is a multi-paradigm programming language encompassing imperative, functional, generic, object-oriented (class-based), and component-oriented programming disciplines. It was developed by Microsoft within the .NET initiative a
NOX5
- 感谢您选择龙脉科技加密产品!本文档帮助您快速完成加密保护工作。 以下建议旨在帮助您快速开展后面的工作: 1请认真阅读密码单中重要信息。 2将锁插入USB接口中,待指示灯点亮后继续下面的步骤。 3请在sample目录中找到您熟悉的开发语言或环境的例子,运行例程,参考这些例程了解加密锁API的使用方法。 4参考过程中,如果遇到陌生的概念或参数,请在help目录中查看帮助文档。 5熟悉了API的使用方法之后,在tools目录下运行设号工具,设置锁的相关 参数,请牢记超级密码
card_demo_20111021
- 本原码符合 并通过测试规范,主要是应用在磁条非接触式支付应用(MSD)和快速借记/贷记非接触式支付应用(qPBOC)相关测试,是基于EMV支付应用和中国金融集成电路(IC)卡借记/贷记规范的基本之上的,是PBOC2.0卡应用规范的附加功能。本测试规范主要是对于快速借记/贷记非接触式支付应用(qPBOC)实现快速支付功能和应用流程进行测试。 2. 范围 本测试规范主要是针对于磁条非接触式支付应用(MSD)和快速借记/贷记非接触式支付应用(qPBOC),执行快速小额支付进行测试。 3.
watermarking
- CT based encryption 1. Open contourlet 5 and run aaa.m for image decomposition and for denoising 2. Open tsss and A_hidetext.m and set break point at line 109 and run 3. After selecting image ind text press F5 4. Now run H_finalextra
MD5
- VBS MD5加密算法代码 Private Const BITS_TO_A_BYTE = 8 Private Const BYTES_TO_A_WORD = 4 Private Const BITS_TO_A_WORD = 32 Private m_lOnBits(30) Private m_l2Power(30) m_lOnBits(0) = CLng(1) m_lOnBits(1) = CLng(3) m_lOnBits(2) = CLng
aodv
- Some operating systems support more than one type of hash. In fact, sometimes the standard DES-based algorithm is replaced by an MD5-based algorithm. The hash type is triggered by the salt argument. Prior to 5.3, PHP would determine the available alg
456
- RSA算法的C语言实现 1.密钥的产生 (1)选两个安全的大素数p和q。 (2)计算n=p×q,φ(n)=(p-1)(q-1),其中φ(n)是n的欧拉函数值。 (3)选一整数e,满足1<e<φ(n),且gcd(φ(n),e)=1。 (4)计算d,满足de≡1 modφ(n),即d是e在模φ(n)下的乘法逆元,因e与φ(n)互素,由模运算可知,它的乘法逆元一定存在。 (5)以{e,n}为公开钥,{d,n}为秘密钥。 2.加密 加密时首先将明文M比特串分组
ImageQualityMeasures
- Image / Picture Quality Measures In this application, different image quality measures are calculated for a distorted image with reference to an original image. To test the application, a set of 20 distorted images i ncluded in this package. The
diffie_hellman
- Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random number mod p. Now generate A,
