搜索资源列表
loki加密算法C语言源代码
- loki加密算法 /* This is an independent implementation of the encryption algorithm: */ /* */ /* LOKI97 by Brown and Pieprzyk */ /*
usemd5ofwtl.rar
- 不记得在哪个地方得到了一个MD5加密法的类,由于开发的原因要在WTL中使用MD5加密法,但是,这个类并不能直接的用在WTL中(In MFC it was an easy job ),所以我就修改了一下,以方便大家以后在WTL中使用MD5加密法。
MyNetwork
- An ethernet bridge / VPN program for windows
AN-1011.ZIP
- demo net drive for linux
AnIntroductiontoGCC
- An+Introduction+to+GCC,学习linux下C语言编程的学习资料,包含了源代码-An+ Introduction+ to+ GCC, learning linux C programming language under the learning materials, including the source code
An-improved-method-of-encrypting-Java-source-code.
- 一种改进加密Java源码的方法An improved method of encrypting Java source code-An improved method of encrypting Java source code
An.Introduction.to.Design.Patterns.in.C.with.Qt.4.
- 《Qt4设计模式导论》介绍了C++编程知识和Qt的设计模式,由浅入深。-An Introduction to Design Patterns in C with Qt 4
An-Introduction-to-Cryptography
- 加密基础,密码学介绍中文第二版(An Introduction to Cryptography)-Based encryption, cryptography introduces Chinese Second Edition (An Introduction to Cryptography)
An-Introduction-in-CPP-with-Qt-4
- 一个介绍设计模式的C + +与Qt 4是一个完整的教程和参考,不承担任何以前的C,C + +对象,或图案的知识。你走过每一个核心概念,一次一个步骤,通过广泛收集的Qt 4.1测试例子和练习学习。-An Introduction to Design Patterns in C++ with Qt 4 is a complete tutorial and reference that assumes no previous knowledge of C, C++, objects, or patte
An-Efficient-Defense-Scheme-2011
- An Efficient Defense Scheme 20-An Efficient Defense Scheme 2011
An-improved-algorithm-of-ecc
- 一种改进的椭圆曲线密码实现算法,椭圆曲线秘法体系(ecc)-An improved algorithm of elliptic curve cryptosystem implementation
An-encryption-algorithm
- 一个基于BASE64的可以加密数据的算法-An encryption algorithm of the data
An-introduction-to-the-GNU-debugger
- IBM的技术大牛使用GDB来debug software 的方法介绍。-Linux software debugging with GDB An introduction to the GNU debugger
FUZZY-COGNITIVE-MAPS-FOR-DECISION-SUPPORT-IN-AN.r
- The “health” of a computer network needs to be assessed and protected in much the same manner as the health of a person. The task of an intrusion detection system is to protect a computer system by detecting and diagnosing attempted breaches
Memory-access-ordering---an-introduction.pdf.tar.
- Memory access ordering - an introduction
Improving-an-efficient-ID-based-RSA-
- Improving an efficient ID-based RSA multisignature
An-encryption-method
- 基于干涉原理运用多重密钥加密,属于光学加密与加密的体系-An encryption method with multiple encrypted keys based on interference principle
Creating-an-embedded-system-IDE
- ARM嵌入式Linux驱动程序开发(电子课件) 第2章 创建嵌入式系统开发环境-Creating an embedded system IDE