资源列表

« 1 2 ... .56 .57 .58 .59 .60 1861.62 .63 .64 .65 .66 ... 16282 »

[加密解密creat_pwd

说明:密码穷举,可穷举0-9,a-z共36个字符- U5BC6 u7E1 u7E1 u7E7 u4E3E uFF0C u53EF u7A77 u4E3E0-9 uFF0Ca-z u517136 u4E2A u5B57 u7B26
<alexander> 在 2025-02-10 上传 | 大小:1kb | 下载:0

[系统编程yqmxmpy

说明:埃特金加速法 中国矿业大学理学院 计算方法实验5,还可以的-Aitken acceleration method China mining university faculty of science calculation method for the experiment 5, you can also
<boshpadd> 在 2025-02-10 上传 | 大小:1kb | 下载:0

[系统编程fnagtal-const

说明:VB启动一个默认的页面链接 VB启动一个默认的页面链接,不错的-VB start a default page links VB start a default page links, good
<zoc&702168> 在 2025-02-10 上传 | 大小:1kb | 下载:0

[系统编程thytestdngDLL

说明:dll测试的文件可以把dll文件的效果进行查看,效果很好的-DLL file testing can be see the effect of the DLL, the effect is very good
<flopay> 在 2025-02-10 上传 | 大小:1kb | 下载:0

[弱点检测代码AKS

说明:Implement AKS algorithm for primality testing, which was the first polynomial time primality test that was devised. Read the paper attached and implement the main algorithm. Implement for numbers of size max 64 bits.
<jitender grover> 在 2025-02-10 上传 | 大小:1kb | 下载:0

[CA认证prob3

说明:Miller-Rabin test is a primality test algorithm which determines whether a given number is prime or not. Implement Miller-Rabin primality test as given in the text book page 257, Algorithm 7.44. (aN− 1 6= 1 mod
<jitender grover> 在 2025-02-10 上传 | 大小:1kb | 下载:0

[CA认证4

说明:Cryptographic Hash Functions: A cryptographic hash function must have at least two security properties: collision free and Hiding. Collision free property ensures that for a given function H, no one can find x and y
<jitender grover> 在 2025-02-10 上传 | 大小:1kb | 下载:0

[CA认证discrete_log

说明:Solve descrete log problem using meet in the middle attack. More formally, write a program to compute discrete log modulo a prime p. Let g be some element in Z p and suppose you are given h in Z p such that h = gx
<jitender grover> 在 2025-02-10 上传 | 大小:1kb | 下载:0

[CA认证diffie_hellman

说明:Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random
<jitender grover> 在 2025-02-10 上传 | 大小:1kb | 下载:0

[CA认证q1

说明:Consider an organization with three roles: A, B and C. Whenever B has to issue some instruction to A, B has to take permission via C and then only it will be obeyed by A. This permission is issued with the help of a
<jitender grover> 在 2025-02-10 上传 | 大小:1kb | 下载:0

[系统编程OFDM

说明:仿真比较OFDM系统的实现与模拟调制实现,更加方便快捷的傅里叶变换-OFDM system IDFT
<limingrong> 在 2025-02-10 上传 | 大小:1kb | 下载:0

[系统编程ezwai41

说明:一个检查游戏有没有启动的好工具,本人是菜鸟,写了不好请大家见谅!,-A good tool to check games have started, I am a novice, write not good, please forgive me!
<VYGhfd$671418> 在 2025-02-10 上传 | 大小:1kb | 下载:0
« 1 2 ... .56 .57 .58 .59 .60 1861.62 .63 .64 .65 .66 ... 16282 »

源码中国 www.ymcn.org