虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

KEY

  • In the rectangle packing problem, encoding schemes to represent the placements of rectangles are t

    In the rectangle packing problem, encoding schemes to represent the placements of rectangles are the KEY factors of efficient algorithms. In 1995, an epoch-making encoding scheme

    标签: placements rectangles the rectangle

    上传时间: 2017-06-16

    上传用户:hn891122

  • In the rectangle packing problem, encoding schemes to represent the placements of rectangles are th

    In the rectangle packing problem, encoding schemes to represent the placements of rectangles are the KEY factors determining the efficiency of algorithms. SEQP AIR is one of the most sophisticated encoding sheme, which has been considered to have a small solution space

    标签: placements rectangles the rectangle

    上传时间: 2013-12-24

    上传用户:hphh

  • DES工作的基本原理是

    DES工作的基本原理是,其入口参数有三个:KEY、data、mode。 KEY为加密解密使用的密钥,data为加密解密的数据,mode为其工作模式。当模式为加密模式时,明文按照64位进行分组,形成明文组,KEY用于对数据加密,当模式为解密模式时,KEY用于对数据解密。实际运用中,密钥只用到了64位中的56位,这样才具有高的安全性。

    标签: DES

    上传时间: 2014-11-22

    上传用户:zukfu

  • Consecutive AES core Description of project.. Features - AES encoder - 128/192/256 bit -

    Consecutive AES core Description of project.. Features - AES encoder - 128/192/256 bit - AES decoder - 128/192/256 bit Status - KEY Expansion added - Encoder added - Decoder added - Documentation added

    标签: Consecutive Description AES Features

    上传时间: 2017-06-25

    上传用户:talenthn

  • VHDL implementation of the twofish cipher for 128,192 and 256 bit KEYs. The implementation is in li

    VHDL implementation of the twofish cipher for 128,192 and 256 bit KEYs. The implementation is in library-like form All needed components up to, including the round/KEY schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable KEY/text, ECB/CBC monte carlo) for 128, 192 and 256 bit KEY sizes, along with their respective vector files.

    标签: implementation twofish cipher VHDL

    上传时间: 2017-06-25

    上传用户:王小奇

  • The MINI2440 is an effecient ARM9 development board with a comprehensive price, it characterizes sim

    The MINI2440 is an effecient ARM9 development board with a comprehensive price, it characterizes simple method and high performance-price ratio. Based on the Samsung S3C2440 microprocessor, it embodies professional stable CPU core power source chip and reset chip to ensure the stability of the system operation. The PCB on the MINI2440 board is designed to be 4-layers board, adopting the ENIG technology and professional equal-length wiring to ensure the completeness of the signals of the KEY signal wires and manufactured and released under stringent quality control plans. With the help of this detailed manual, users are supposed to become proficient in the development process of embedded Linux and WinCE operating system, they are supposed to get the foundation, so long as they have obtained the basic and necessary knowledge about the C language, in two weeks.

    标签: comprehensive characterizes development effecient

    上传时间: 2013-12-18

    上传用户:csgcd001

  • 按return键到后台

    按return键到后台,调用popallform的时候,首先执行deactive form,这样在pop栈顶form的时候,下一个form将不会收到active事件,缩短响应return KEY事件的时间

    标签: return 后台

    上传时间: 2017-07-19

    上传用户:15736969615

  • Java Application for testing Encryption/Decryption of several algorithms: Ceaar, Vigenere, a custom

    Java Application for testing Encryption/Decryption of several algorithms: Ceaar, Vigenere, a custom make alg (KEY + permutation of elements)

    标签: Application Encryption Decryption algorithms

    上传时间: 2014-01-18

    上传用户:CHENKAI

  • A certification path is an ordered list of certificates starting with a certificate issued by the re

    A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509 and further defined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 3280. Certification path processing verifies the binding between the subject distinguished name and/or subject alternative name and the subject public KEY defined in the target certificate. The binding is limited by constraints, which are specified in the certificates that comprise the path, and inputs that are specified by the relying party. To ensure secure interoperation of PKI-enabled applications, the path validation must be done in accordance with the X.509 and RFC 3280 specifications. This document provides the test assertions and the test cases for testing path validation software against these specifications.

    标签: certification certificates certificate starting

    上传时间: 2017-07-31

    上传用户:清风冷雨

  • This Symbian C++ code example demonstrates how to easily use the onboard camera with zoom and autofo

    This Symbian C++ code example demonstrates how to easily use the onboard camera with zoom and autofocus, utilising an accompanying CameraWrapper made by Forum Nokia. The Camera Wrapper supports all Nokia s S60 devices based on S60 3rd Edition and newer, providing a unified interface for various Symbian and S60 camera APIs some of which have previously been Feature Pack specific or only available via an SDK plug-in. The example application supports the use of both the KEYpad and touch UI. The application can be self-signed, but it also provides an option to use the dedicated camera KEY (Symbian signing required). The example application replaces the separate examples published for S60 3rd Edition, FP1 (S60 Platform: Camera Example with AutoFocus Support v2.2) and FP2 (S60 Camera Example AutoFocus 3rd Ed FP2).

    标签: demonstrates Symbian example onboard

    上传时间: 2013-12-11

    上传用户:hopy