The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
标签: cryptography literature has Secrecy
上传时间: 2016-12-08
上传用户:fxf126@126.com
The AVRcam source files were built using the WinAVR distribution (version 3.3.1 of GCC). I haven t tested other versions of GCC, but they should compile without too much difficulty. * The source files for the AVRcam had the author name and copyright information added back into them after the judging of the project, since it states in the competition rules that the author s name can not be present during their inspection. * The included source files are the ones that were submitted for the entry into the Circuit Cellar contest. I have continued to develop the AVRcam, and have added several new features (such as ignoring objects that aren t larger than a minimum size, removing tracked objects that overlap with each, and some general optimizations). If you are interested in the latest source, email me at john@jrobot.net * For more info about the AVRcam, check out http://www.jrobot.net John Orlando August 20, 2004
标签: distribution version AVRcam source
上传时间: 2016-12-30
上传用户:GavinNeko
A "code-what"? Unless you have spent some time working in the area of reverse engineering, chances are you have not heard of the term "codecave" before. If you have heard of it, you might not have read a clear definition of it or quite understand what it is or why it is useful. I have even asked seasoned assembly programmers about the term before and most of them had not heard of it. If it is new to you, do not worry, you are not the only one. It is a term that is scarcely used and is only useful in a reverse engineering context. Furthermore, is it "codecave" or "code cave"? I am not quite sure, but I will try my best to refer to it consistently as a "codecave". A space may sneak in there from time to time
标签: engineering code-what chances reverse
上传时间: 2014-01-17
上传用户:hn891122
To review what a metaball is, and how to render them and to describe a new optimization I ve made for rendering metaballs. For complex scenes, it can render hundreds of times faster, though I m certain others have discovered this trick as well. It does very slightly change the characteristic shape of the blobs, but there is no loss in image quality whatsoever. (I actually developed all this about two years ago, but just now felt like writing it all down, and had the time!)
标签: optimization and metaball describe
上传时间: 2013-12-27
上传用户:彭玖华
Maya Calendar During his last sabbatical, professor M. A. Ya made a surprising discovery about the old Maya calendar. From an old knotted message, professor discovered that the Maya civilization used a 365 day long year, called Haab, which had 19 months. Each of the first 18 months was 20 days long, and the names of the months were pop, no, zip, zotz, tzec, xul, yoxkin, mol, chen, yax, zac, ceh, mac, kankin, muan, pax, koyab, cumhu. Instead of having names, the days of the months were denoted by numbers starting from 0 to 19. The last month of Haab was called uayet and had 5 days denoted by numbers 0, 1, 2, 3, 4. The Maya believed that this month was unlucky, the court of justice was not in session, the trade stopped, people did not even sweep the floor.
标签: A. M. sabbatical surprising
上传时间: 2014-01-05
上传用户:libenshu01
This algorithm is to count the dark colored pixels in the input image. This can be used in goods sorting like rice, paddy etc... in paddy or rice or other goods or products to sort out the bad or defect one we can use this algorithm. I had done this for my Masters Degree as a small part and now i am releasing for you. rajesh.f, Kanayakumari district, India. contact me: rajesh1983jan10@yahoo.com
标签: This algorithm the colored
上传时间: 2017-05-02
上传用户:liglechongchong
Far too many programmers and software designers consider efficient C++ to be an oxymoron. They regard C++ as inherently slow and inappropriate for performancecritical applications. Consequently, C++ has had little success penetrating domains such as networking, operating system kernels, device drivers, and others.
标签: programmers designers efficient consider
上传时间: 2013-12-12
上传用户:凌云御清风
I would like to thank my advisor, Dr. A. Lynn Abbott, for helping me throughout my research, Gary Fleming and the rest of the people at NASA Langley who provided all the flight information and image sequences, and my parents who supported me in my decision to enter graduate study. Also, thanks to Phichet Trisirisipal and Xiaojin Gong for helping when I had computer vision questions, and Nathan Herald for his help creating an illustration.
标签: A. throughout research advisor
上传时间: 2017-06-18
上传用户:maizezhen
During the past four years, most of our research activities have been focused on image but also video and 3-D objects processing for security applications (watermarking and biometrics) and communications (talking heads, interfaces), with a special emphasis on facial images. More about our work can be found at http://www.eurecom.fr/~image. Our research activities are conducted with the backing of several industrials, in particular France Telecom Research and STMicroelectronics. For the past few years, we have had a regular scientific collaboration on Fractal Image Coding, Watermarking and Biometrics with the University of California, Santa Barbara (UCSB), in particular with Prof. K. Ros
标签: activities research focused During
上传时间: 2014-11-26
上传用户:123啊
ieee754的标准,原英文版的!Twenty years ago anarchy threatened floating-point arithmetic. Over a dozen commercially significant arithmetics boasted diverse wordsizes, precisions, rounding procedures and over/underflow behaviors, and more were in the works. “Portable” software intended to reconcile that numerical diversity had become unbearably costly to develop. Thirteen years ago, when IEEE 754 became official, major microprocessor manufacturers had already adopted it despite the challenge it posed to implementors. With unprecedented altruism, hardware designers had risen to its challenge in the belief that they would ease and encourage a vast burgeoning of numerical software. They did succeed to a considerable extent. Anyway, rounding anomalies that preoccupied all of us in the 1970s afflict only CRAY X-MPs — J90s now.
上传时间: 2017-07-28
上传用户:894898248