搜索资源列表
CubicSpline
- Cubic spline algorithm approximating function y=f(x) - ((-2)*x*(2*x+3))/(x*x+4*x+5) in interval [-2 2]-Cubic spline algorithm approximating function y=f(x)- ((-2)*x*(2*x+3))/(x*x+4*x+5) in interval [-2 2]
jj
- CORNACCHIA Algorithm * * GOAL: given d and p prime, find (x,y) such that x^2 + y^2 = d * p * * in this implementation, d = 1. This code does not accept d <> 1 !!! * see "A Course in Computational Algebraic Number Theory" by Henri
NSGAII
- [num,len] = size(y) Initialize all the distance of individuals as zero. for i = 1 : M for j = 2 : num - 1 distance(j).individual = 0 -[num,len] = size(y) Initialize all the distance of individuals as zero. for i = 1 : M fo
visualCryptography
- Criptografi Visual Se descompone cada pixel de la imagen dos bloque de 2x2 pixeles, estos bloques en conjunto formarán dos imágenes de salida. Las reglas para asignar los bloques a la imagen de salida son: • Cuando se trata de un pixel b
ANALYTICAL_GA
- The scr ipt fits a given general analytical law using Genetic Algorithms. Such law can depend on several input variables and various parameters, but it must have only one output, to be matched to the input variable y. The optimum coefficients a
Elgamal
- ElGamal algorithm not only used for data encryption can be used for digital signatures, their safety depends on the calculation of a finite field discrete logarithm this problem. Key to the method. First of all, choose a prime number p, the two rando
4
- Cryptographic Hash Functions: A cryptographic hash function must have at least two security properties: collision free and Hiding. Collision free property ensures that for a given function H, no one can find x and y such that H(x) = H(y). The hid