The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
标签: cryptography literature has Secrecy
上传时间: 2016-12-08
上传用户:fxf126@126.com
The TMS320LF240xA and TMS320LC240xA devices, new members of the TMS320C24x generation of digital signal processor (DSP) controllers, are part of the TMS320C2000 platform of fixed-point DSPs. The 240xA devices offer the enhanced TMS320 DSP architectural design of the C2xx core CPU for low-cost, low-power, and high-performance processing capabilities. Several advanced peripherals, optimized for digital motor and motion control applications, have been integrated to provide a true single-chip DSP controller. While code-compatible with the existing C24x DSP controller devices, the 240xA offers increased processing performance (40 MIPS) and a higher level of peripheral integration. See the TMS320x240xA Device Summary section for device-specific features.
标签: TMS 320 generation 240
上传时间: 2013-12-16
上传用户:GavinNeko
teachers asp management system source code access, but also the integrity of supporting papers, it can be used. As part of the graduation design all. We quickly put to download
标签: management supporting integrity teachers
上传时间: 2013-12-19
上传用户:tb_6877751
FDMP the body of the kernel, the Information-Technology Promotion Agency (IPA) adopted by the unexplored themes of Creativity software is one of the "multi-processor system-level development environment for the development of the system" as part of the development Susumu Honda也氏Was responsible.
标签: the Information-Technology Promotion adopted
上传时间: 2013-12-25
上传用户:dengzb84
Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits. It has proved to be an extremely versatile tool on the unix platform. So why should NT always be unix s poor cousin when it comes to tcp/ip testing and exploration? I bet many NT admins out there keep a unix box around to use tools such as Netcat or to test their systems with the unix version of an NT vulnerability exploit. With Netcat for NT part of that feeling disempowerment is over.
上传时间: 2017-04-02
上传用户:onewq
The Library Reference describes the C functions, data types, and protocols that are included as part of the QNX Neutrino RTOS.
标签: Reference describes functions protocols
上传时间: 2014-01-17
上传用户:lizhen9880
MATSNL is a package of MATLAB M-files for computing wireless sensor node lifetime/power budget and solving optimal node architecture choice problems. It is intended as an analysis and simulation tool for researchers and educators that are easy to use and modify. MATSNL is designed to give the rough power/ lifetime predictions based on node and application specifications while giving useful insight on platform design for the large node lifetime by providing side-by-side comparison across various platforms. The MATSNL code and manual can be found at the bottom of this page. A related list of publications describing the models used in MATSNL is posted on the ENALAB part of the 2 project at http://www.eng.yale.edu/enalab/aspire.htm
标签: computing lifetime wireless M-files
上传时间: 2014-01-01
上传用户:lnnn30
This Simulink model simulates as an example the transmission and reception of random digital data modulated with GMSK. The purpose of this model is to illustrate how part of the GSM transmission and reception works. It also measures the BER, affected by an AWGN channel.
标签: transmission simulates reception Simulink
上传时间: 2017-07-28
上传用户:litianchu
Anthony s book is easily the most complete treatment of eCos system development. I believe it is destined to become part of every eCos developer s library." —Michael Tiemann, CTO, Red Hat Software and Co-founder of Cygnus Solutions
标签: development treatment complete Anthony
上传时间: 2014-01-10
上传用户:frank1234
Device-to-device(D2D) communications are now considered as an integral part of future 5G networks which will enable direct communication between user equipment (UE) without unnecessary routing via the network infrastructure. This architecture will result in higher throughputs than conventional cellular networks, but with the increased potential for co-channel interference induced by randomly located cellular and D2D UEs.
标签: Device-to-Device Communications Analysis of
上传时间: 2020-05-26
上传用户:shancjb