资源列表
3870770
- Get examples of windows system related information-The Get examples of Windows system related information
AKS
- Implement AKS algorithm for primality testing, which was the first polynomial time primality test that was devised. Read the paper attached and implement the main algorithm. Implement for numbers of size max 64 bits. Bonus marks will be given,
sbzrcecode
- mybatis-generator-core-1,3,2 Java source code-Mybatis generator- core- 1 31 Java source code
9053818
- RandomAccessFile 对文件操作,很好用的哟,不错的东西-RandomAccessFile for file operations, very useful yo, nice stuff
prob3
- Miller-Rabin test is a primality test algorithm which determines whether a given number is prime or not. Implement Miller-Rabin primality test as given in the text book page 257, Algorithm 7.44. (aN− 1 6= 1 mod N) Write three functions to
4
- Cryptographic Hash Functions: A cryptographic hash function must have at least two security properties: collision free and Hiding. Collision free property ensures that for a given function H, no one can find x and y such that H(x) = H(y). The hid
discrete_log
- Solve descrete log problem using meet in the middle attack. More formally, write a program to compute discrete log modulo a prime p. Let g be some element in Z p and suppose you are given h in Z p such that h = gx where 1 ≤ x ≤ 240. Your goal
diffie_hellman
- Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random number mod p. Now generate A,
q1
- Consider an organization with three roles: A, B and C. Whenever B has to issue some instruction to A, B has to take permission via C and then only it will be obeyed by A. This permission is issued with the help of a digital signature. A verifies
glorartree
- source code for the examples Mike Smith s book Java-The source code for the examples Mike Smith s book Java
the
- Press the form into the system tray
217908
- QQ 2005 贺岁版登录口令加密算法原理以及C++,VB源代码,-2005 new edition QQ login password encryption algorithm principle and c++, VB source code,