登录
首页 » MultiPlatform » 硬件求解平方根

硬件求解平方根

于 2004-10-05 发布 文件大小:39KB
0 180
下载积分: 1 下载次数: 26

代码说明:

  硬件求解平方根源代码加密 (硬件求解平方根的,将license添加到原有的MaxplusII或QuartusII的license中就可以直接使用,但源代码加密。altera提供 )(solving square root of the hardware encryption code (square root of the hardware solution will be added to the original license MaxplusII or Quartus II of the license which can be directly used, but the source code encryption. ALTERA provide))

文件列表:

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • md5encode
    MD5加密算法,可以加密包含二进制数据的数据块,生成16字节MD5加密数据。(MD5 encryption algorithm to encrypt data blocks that contain binary data, generates a 16-byte MD5 encrypted data.)
    2013-09-09 18:27:10下载
    积分:1
  • JPEG2000 image format for the use of the Arnold transform the image of the wavel...
    针对JPEG2000格式的图像,利用了Arnold变换对图像的小波系数进行加密,对初步研究JPEG2000图像加密算法的有试用价值-JPEG2000 image format for the use of the Arnold transform the image of the wavelet coefficients encryption, preliminary study of the JPEG2000 image encryption algorithms have tested the value of
    2022-03-02 04:18:08下载
    积分:1
  • 用Visual C++实现数字图像迭代混沌
    用Visual c++实现数字图像迭代混沌加密-Using Visual c++ Realize digital image iterative chaotic encryption
    2022-05-30 11:53:02下载
    积分:1
  • a sample algorithm of rsa in langage C
    a sample algorithm of rsa in langage C-a sample algorithm of rsa in langage C++
    2023-02-04 03:10:04下载
    积分:1
  • ieee一种基于混沌的新方法An Image Encryption Scheme Based on Chaotic Map...
    ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security
    2022-05-30 11:41:05下载
    积分:1
  • KinSlideshow
    jquery.KinSlideshow-1.2.1 源码
    2013-12-30 15:03:38下载
    积分:1
  • rsa实验,刚学会的
    rsa实验,刚学会的-rsa experiments, the newly acquired
    2022-02-01 18:31:21下载
    积分:1
  • 该源码包括了Java组件实现DES、RSA和SHA算法
    该源码包括了Java加密组件实现DES、RSA和SHA加密算法 -The Java source code, including encryption components realize the DES, RSA and SHA encryption algorithm
    2023-06-15 20:40:03下载
    积分:1
  • rsa
    Some example methods to evaluate and break simple RSA
    2011-02-06 16:51:56下载
    积分:1
  • voltage 公司提供的一个开发Ibe的工具包,
    voltage 公司提供的一个开发Ibe的工具包,-voltage provided by a Ibe development tool kit
    2022-08-14 06:16:26下载
    积分:1
  • 696516资源总数
  • 106457会员总数
  • 15今日下载