CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 源码下载 系统编程

资源列表

« 1 2 ... .61 .62 .63 .64 .65 14166.67 .68 .69 .70 .71 ... 15014 »
  1. 3870770

    0下载:
  2. Get examples of windows system related information-The Get examples of Windows system related information
  3. 所属分类:Network Security

    • 发布日期:2017-12-17
    • 文件大小:13kb
    • 提供者:preymwtion
  1. AKS

    0下载:
  2. Implement AKS algorithm for primality testing, which was the first polynomial time primality test that was devised. Read the paper attached and implement the main algorithm. Implement for numbers of size max 64 bits. Bonus marks will be given,
  3. 所属分类:Exploit

    • 发布日期:2017-12-12
    • 文件大小:1.01kb
    • 提供者:jitender grover
  1. sbzrcecode

    0下载:
  2. mybatis-generator-core-1,3,2 Java source code-Mybatis generator- core- 1 31 Java source code
  3. 所属分类:Network Security

    • 发布日期:2017-12-14
    • 文件大小:251.09kb
    • 提供者:Caesbr
  1. 9053818

    0下载:
  2. RandomAccessFile 对文件操作,很好用的哟,不错的东西-RandomAccessFile for file operations, very useful yo, nice stuff
  3. 所属分类:Network Security

    • 发布日期:2017-12-16
    • 文件大小:2kb
    • 提供者:ZOJkrux$9137
  1. prob3

    0下载:
  2. Miller-Rabin test is a primality test algorithm which determines whether a given number is prime or not. Implement Miller-Rabin primality test as given in the text book page 257, Algorithm 7.44. (aN− 1 6= 1 mod N) Write three functions to
  3. 所属分类:CA program

    • 发布日期:2017-12-11
    • 文件大小:598byte
    • 提供者:jitender grover
  1. 4

    0下载:
  2. Cryptographic Hash Functions: A cryptographic hash function must have at least two security properties: collision free and Hiding. Collision free property ensures that for a given function H, no one can find x and y such that H(x) = H(y). The hid
  3. 所属分类:CA program

    • 发布日期:2017-12-14
    • 文件大小:597byte
    • 提供者:jitender grover
  1. discrete_log

    0下载:
  2. Solve descrete log problem using meet in the middle attack. More formally, write a program to compute discrete log modulo a prime p. Let g be some element in Z p and suppose you are given h in Z p such that h = gx where 1 ≤ x ≤ 240. Your goal
  3. 所属分类:CA program

    • 发布日期:2017-12-12
    • 文件大小:873byte
    • 提供者:jitender grover
  1. diffie_hellman

    0下载:
  2. Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random number mod p. Now generate A,
  3. 所属分类:CA program

    • 发布日期:2017-12-12
    • 文件大小:676byte
    • 提供者:jitender grover
  1. q1

    0下载:
  2. Consider an organization with three roles: A, B and C. Whenever B has to issue some instruction to A, B has to take permission via C and then only it will be obeyed by A. This permission is issued with the help of a digital signature. A verifies
  3. 所属分类:CA program

    • 发布日期:2017-12-12
    • 文件大小:547byte
    • 提供者:jitender grover
  1. glorartree

    0下载:
  2. source code for the examples Mike Smith s book Java-The source code for the examples Mike Smith s book Java
  3. 所属分类:Network Security

    • 发布日期:2017-12-13
    • 文件大小:175.36kb
    • 提供者:Bqnnie
  1. the

    0下载:
  2. Press the form into the system tray
  3. 所属分类:Network Security

    • 发布日期:2017-12-23
    • 文件大小:9kb
    • 提供者:imifehv
  1. 217908

    0下载:
  2. QQ 2005 贺岁版登录口令加密算法原理以及C++,VB源代码,-2005 new edition QQ login password encryption algorithm principle and c++, VB source code,
  3. 所属分类:Network Security

    • 发布日期:2017-12-10
    • 文件大小:121.86kb
    • 提供者:mqrlzve
« 1 2 ... .61 .62 .63 .64 .65 14166.67 .68 .69 .70 .71 ... 15014 »
搜珍网 www.dssz.com