Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public KEY cryptography, cryptographic hashes and MACs, authentication and KEY exchange, PKI, random numbers, and anti-tampering.
标签: Programming developers for important
上传时间: 2015-09-03
上传用户:gundan
AES decoder aes_dec.vhdl AES encoder aes_enc.vhdl Package used by rest of design aes_pkg.vhdl KEY Expansion component for AES encoder and decoder KEY_expansion.vhdl
上传时间: 2015-09-07
上传用户:许小华
Hard-decision decoding scheme Codeword length (n) : 31 symbols. Message length (k) : 19 symbols. Error correction capability (t) : 6 symbols One symbol represents 5 bit. Uses GF(2^5) with primitive polynomial p(x) = X^5 X^2 + 1 Generator polynomial, g(x) = a^15 a^21*X + a^6*X^2 + a^15*X^3 + a^25*X^4 + a^17*X^5 + a^18*X^6 + a^30*X^7 + a^20*X^8 + a^23*X^9 + a^27*X^10 + a^24*X^11 + X^12. Note: a = alpha, primitive element in GF(2^5) and a^i is root of g(x) for i = 19, 20, ..., 30. Uses Verilog description with synthesizable RTL modelling. Consists of 5 main blocks: SC (Syndrome Computation), KES (KEY Equation Solver), CSEE (Chien Search and Error Evaluator), Controller and FIFO Register.
标签: symbols length Hard-decision Codeword
上传时间: 2014-07-08
上传用户:曹云鹏
忘不了密码小管家(分类管理各种密码的小工具[包括上网密码,CD-KEY及游戏密技等])
上传时间: 2013-11-29
上传用户:frank1234
The aim of this application note is to show to scan the 4x4 matrix KEYpad multiplexed with a four 7-segment display. The software attached to this application note scans the pressed KEY and displays it on the multiplexed 7- segment LEDs. This application note makes obvious Interrupt capability of the STR710 device to offer a better KEY scan .
标签: application multiplexed matrix KEYpad
上传时间: 2015-09-13
上传用户:thuyenvinh
VC技术内幕第五版(英文)The 6.0 release of Visual C++ shows Microsoft s continued focus on Internet technologies and COM, which are KEY components of the new Windows Distributed interNet Application Architecture (DNA). In addition to supporting these platform initiatives, Visual C++ 6.0 also adds an amazing number of productivity-boosting features such as Edit And Continue, IntelliSense, AutoComplete, and code tips. These features take Visual C++ to a new level. We have tried to make sure that this book keeps you up to speed on the latest technologies being introduced into Visual C++.
标签: technologie Microsoft continued Internet
上传时间: 2014-11-22
上传用户:ggwz258
Robustnesstochangesinilluminationconditionsaswellas viewing perspectives is an important requirement formany computer vision applications. One of the KEY fac-ors in enhancing the robustness of dynamic scene analy-sis that of accurate and reliable means for shadow de-ection. Shadowdetectioniscriticalforcorrectobjectde-ection in image sequences. Many algorithms have beenproposed in the literature that deal with shadows. How-ever,acomparativeevaluationoftheexistingapproachesisstill lacking. In this paper, the full range of problems un-derlyingtheshadowdetectionareidenti?edanddiscussed.Weclassifytheproposedsolutionstothisproblemusingaaxonomyoffourmainclasses, calleddeterministicmodeland non-model based and statistical parametric and non-parametric. Novelquantitative(detectionanddiscrimina-ionaccuracy)andqualitativemetrics(sceneandobjectin-dependence,?exibilitytoshadowsituationsandrobustnesso noise) are proposed to evaluate these classes of algo-rithms on a benchmark suite of indoor and outdoor videosequences.
标签: Robustnesstochangesinillumination conditionsaswellas perspectives requirement
上传时间: 2014-01-23
上传用户:whenfly
This code is a cipher which takes in a plaintext or ciphertext string and encrypts / decrypts according to a user defined KEY value.
标签: ciphertext plaintext encrypts decrypts
上传时间: 2014-01-05
上传用户:181992417
Dropbear is an SSH 2 server, designed to be usable in small memory environments. It supports: * Main features of SSH 2 protocol * Implements X11 forwarding, and authentication-agent forwarding for OpenSSH clients * Compatible with OpenSSH ~/.ssh/authorized_KEYs public KEY authentication
标签: environments Dropbear designed supports
上传时间: 2014-01-16
上传用户:skhlm
About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP KEYs based on a active dictionary attack, KEY generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only one crypted packet is enough to start cracking - Has its own KEY generator. - Can crack a dumpfile over a network. - Can act as a server and client. - Also works in windows. - Has an fltk gui.
标签: WepDecrypt Wepdecrypt Wireless guesses
上传时间: 2013-12-25
上传用户:6546544