-
MIRACL
支持椭圆曲线运算的大数运算库和源程序,头文件和静态库可以使用。(Support for elliptic curve operations of large numbers arithmetic library and source code, header files and static libraries can be used.)
- 2020-07-03 22:00:01下载
- 积分:1
-
document encryption algorithms, including DES, etc., which are described in deta...
文档加密算法,包括DES等,对其进行了详细的描述
- 2022-01-22 16:53:11下载
- 积分:1
-
jiajiemi
加解密算法的实现,内部包含有多个加解密算法的实现,(Encryption and decryption algorithm, contains a number of internal encryption algorithm,)
- 2009-06-14 15:09:55下载
- 积分:1
-
rsa加密算法实例
rsa加密算法实例-rsa encryption algorithm examples
- 2022-11-16 00:45:03下载
- 积分:1
-
Ge 90
这是ge 90-30的versapro这软体,的使用教学手册。-Ge 90-30 This is the versapro this software, the use of teaching manuals.
- 2023-01-26 06:35:03下载
- 积分:1
-
delphi file crypter full source code
delphi file crypter full source code
- 2022-08-13 03:30:27下载
- 积分:1
-
spear and shield the contest (2)
矛与盾之争(二)——CRC原则部分
- 2022-01-28 18:36:55下载
- 积分:1
-
AML-Efficient-Approximate-Membership
AML EFFICIENT APPROXIMATE MEMBERSHIP LOCALIZATION WITHIN A WEB-BASED JOIN FRAMEWORK ABSTRACT: In this paper, we propose a new type of Dictionary-based Entity Recognition Problem, named Approximate Membership Localization (AML). The popular Approximate Membership Extraction (AME) provides a full coverage to the true matched substrings from a given document, but many redundancies cause a low efficiency of the AME process and deteriorate the performance of real-world applications using the extracted substrings. The AML problem targets at locating non overlapped substrings which is a better approximation to the true matched substrings without generating overlapped redundancies. In order to perform AML efficiently, we propose the optimized algorithm P-Prune that prunes a large part of overlapped redundant matched substrings before generating them.
- 2013-12-15 16:45:53下载
- 积分:1
-
twocrypt(2c)是一个 PoC工具,用于超狂妄者。它把两个文件加密成一个。不同的口令可以用于解译不同的变量。输出不能从单个加密文件中识别出来,并且这个工
twocrypt(2c)是一个 PoC工具,用于超狂妄者。它把两个文件加密成一个。不同的口令可以用于解译不同的变量。输出不能从单个加密文件中识别出来,并且这个工具使用一种合法的算法,这种算法本身并不意味着要隐藏任何信息。-twocrypt (2c) is a PoC tool, uses in the ultra arrogance. It
encrypts two documents. The different password may use in the solution
to translate the different variable. The output cannot from
individually encrypt in the document to distinguish, and this tool
uses one legitimate algorithm, this algorithm itself certainly did not
mean must hide any information.
- 2022-11-27 16:40:03下载
- 积分:1
-
NDIS
实现透明加密,驱动模型,文件过滤系统介绍(To achieve transparent encryption, drive model, document filtering system introduced)
- 2011-05-19 11:26:20下载
- 积分:1