搜索资源列表
duobiaotidai
- 一个周期3的多表代替密码,第1个表由密钥字法产生(密钥字自拟),第2个表由洗牌法产生(注意,字母a~z与数字0~25一一对应),第三个表由公式法产生(数学公式自拟,注意它须是Z26上的一个一一变换)-a cycle of three multi-table instead of passwords, a table by key word method, (key word from the intended), Table No. 2 produced by shuffling method
複製 -CRC演算法與實現 bhw98(原作)
- 討論了CRC的代數學演算法-discussed CRC generation of mathematical algorithms
hill2mima
- 在数学建模中希尔密码的加密与解密是一个复杂的的计算过程,此程序能计算得出任意二阶密钥的加密与解密结果。-Hill, in Mathematical Modeling of encryption and decryption is a complicated calculation process, this process can be any second-order calculation of the encryption and decryption key results.
SRP6
- SRP协议是由斯坦福大学计算机科学系的Thomas wu等开发的,英文全称是Security Remote Password(安全远程密码),经过严密的数学论证,SRP6被证明是一种非常安全的算法,我们可以在这里获取到SRP的协议的官方文档 http://srp.stanford.edu/ndss.html 在当下流行的网络游戏中,魔兽世界采用的就是SRP协议。-SRP agreement was signed by the Department of Computer Science at S
an_intellegent_audio_water_marking_based_on_dwt-s
- All three, Discrete Wavelet Transform (DWT) - Singular Value Decomposition (SVD) and Adaptive Tabu Search (ATS) have been used as mathematical tools for embedding data into an audio signal. In this paper, we present a new robust audio waterma
EBF561_FIR
- 本实验的重点在于把课上学过的理论知识转化为动手实践能力,不仅要理解FIR滤波的原理和数学实现过程,还要学会使用FIR数字滤波,来处理各种复杂的信号和数据。 2).让我们真正的见识了DSP得一些简单功能,尤其是在线仿真ICE的作用,对于今后深入理解ICE的实现过程起到了相得益彰的作用。-The focus of this study is the lessons, hands-the theoretical knowledge into practical ability, not only
Affinecyper
- The affine cyper is a subtiutution morphoalphabetic cyper, wherein each letter in an alphabet is mapped to its numeric equivalent and then encrypted using a simple mathematical function
Nonlinear_Programming
- 全面而完整,本概述提供了密钥算法和理论的单卷处理。笔者提供所有理论方面的明确解释,与大多数结果严格的证明。这两个部分的处理开始的优选条件和凸规划,对偶,广义凸性的讨论,并选定非线性规划分析推导。第二部份是有关技术和数值解无约束优化方法,并介绍了常用的约束非线性优化问题的算法。本次毕业级文本不需要超出初等微积分,线性代数,高等数学和现实背景分析。 -Comprehensive and complete, this overview provides a single-volume treatm
ec-pin-prob
- vulnerability discussion (mathematical) of Euro Cheque and other cars and specifically their PIN s
Advanced-Encryption-Standard-AES
- 高级加密标准AES的数学原理和数学基础,内容详细。-AES Advanced Encryption Standard based on the mathematical theory and mathematics, and detailed.
kt
- 实现骑士游历问题。 骑士游历问题是一个经典的数学问题。其思想在电路图的设计及图像加密等方面都有帮助,如果能将骑士游历问题算法通过计算机语言程序化将对其在其他领域中的应用有极大帮助。通过研究骑士游历的规则对问题进行数学模型抽象,通过研究骑士游历的方向与可到达情况,将骑士的空间移动抽象成数学表达式,进而映射到程序中所需对应的数据结构形式,最后通过利用JAVA语言得以实现骑士游历问题中骑士游历过程的动态图形演示。 -Knight traveled to achieve the problem. Kni
WPA2mimapojie
- 首先大家要明白一种数学运算,它叫做哈希算法(hash),这是一种丌可逆运算,你丌能通过运算结果来求解出原来癿未知数是多少,有时我们还需要丌同癿未知数通过该算法计算后得到癿结果相同,即你丌太可能找到两个丌同癿值通过哈希得到同一个结果。哈希是一类算法癿统称,通常哈希算法都是公开癿,比如 MD5,SHA-1 等等。-First we need to understand a mathematical operation, it is called the hash algorithm (hash),
AES
- 本书是当前世界上介绍AES最全面的书了,详细的介绍了AES的数学基础,原理算法的构造,以及密码的相关知识,并且有C语言实现代码,是学习AES难得的一本好书. -This book is currently the world s most comprehensive book introduces AES, and a detailed descr iption of the mathematical basis of AES, algorithm construction principles
C_Programs
- TSR (Terminiated and Stay Resident) Program in C which modifies screen into mirror Lagrange = program for mathematical lagrange mean value theorem DES data encryption standards program curve fitting algorithm banner to print the letter in c
shuxuebianji
- 数学编辑器。下载下来直接解压打开即可安装。许多需要输入数学表达式的地方都可以用-Math editor. Open the downloaded directly extract can be installed. Many need to enter mathematical expressions can be used anywhere
ECC
- 椭圆曲线的实现(ECC),椭圆曲线算法是代数几何、数论等多个数学分支的一个交叉点,一直被人们认为是纯理论学科。而椭圆曲线密码体制,是基于椭圆曲线离散对数问题的一种公钥密码体制-Realization of elliptic curves (ECC), elliptic curve algorithm is algebraic geometry, a number of mathematical intersection of number theory and other branches, h
bab3
- this scr ipt is extend bab2.zip. in this section talks about symmetric key in cryptography using mathematical theory such as group, ring, and field. -this scr ipt is extend bab2.zip. in this section talks about symmetric key in cryptography using ma