SHA-1 Source Code This optimized SHA-1 implementation conforms to FIPS 180-1
标签: implementation SHA optimized conforms
上传时间: 2016-01-23
上传用户:xcy122677
AES Source Code This optimized AES implementation conforms to FIPS-197
标签: implementation AES optimized conforms
上传时间: 2013-12-12
上传用户:asasasas
CHAPT14\MODEM.CPP Implementation of the Modem class CHAPT14\MODEM.H Declarations of the Modem class CHAPT14\TSTMODEM.CPP 16-bit test program for the Modem class CHAPT14\TSTMODEM.EXE 16-bit executable of the test program CHAPT14\TSTMODEM.MAK Make file for use with Borland or Microsoft C
上传时间: 2013-12-24
上传用户:坏天使kk
the implementation of an Embedded Zerotree Wavelet encoder or EZW encoder
标签: encoder implementation Embedded Zerotree
上传时间: 2014-01-02
上传用户:erkuizhang
Design and Implementation of the lwIP TCP/IP Stack
标签: Implementation Design Stack lwIP
上传时间: 2016-02-06
上传用户:qiao8960
这是Virtual PC或VMWare虚拟机所创虚拟硬盘的文件读取程序.主要用到的是硬盘及分区格式的知识.因为VMware所创的硬盘文件最小为100M所以我没有测试,如果你测试不可用的话那我也没办法,但VMware的硬盘文件与Virtual PC应该是基本一样的,只是好像VMware在硬盘文件的最后加了一些信息可能.所以VMWare可以使用Virtual PC所创建的硬盘文件,而反过来却不可用,我简单的看了一下,前面的格式是一样的,所以应该说读取这两种文件都不是问题.
标签: Virtual VMWare VMware 100M
上传时间: 2016-02-09
上传用户:84425894
pointbase Pointbase是一个纯JAVA数据库,可以方便的开发JAVA产品。J2EE/RI (Reference Implementation) Pointbase数据库存在安全问题...通过使用特殊构建的SQL命令可导致在运行pointbase数据库的主机上执行任意代码
标签: Pointbase JAVA Implementation pointbase
上传时间: 2014-01-17
上传用户:561596
Synthesizable FIFO Model This example describes a synthesizable implementation of a FIFO. The FIFO depth and FIFO width in bits can be modified by simply changing the value of two parameters, `FWIDTH and `FDEPTH. For this example, the FIFO depth is 4 and the FIFO width is 32 bits.
标签: FIFO implementation Synthesizable synthesizable
上传时间: 2016-02-12
上传用户:源弋弋
a virtual image printer source code
标签: virtual printer source image
上传时间: 2016-02-16
上传用户:trepb001
The paper presents the CORDIC Algorithm, which has been implemented as an virtual component (IP core) in a VHDL simulation environment. The core is packaged as a soft (VHDL) macro and it implements all transcenden-tal functions. Analysis of the accuracy of the algorithms implemented shows that the CORDIC functions are equivalent to the accuracy of a Pentium coprocessor.
标签: implemented Algorithm component presents
上传时间: 2016-02-16
上传用户:wcl168881111111