搜索:encryption+algorithm

找到约 1,353 项符合「encryption+algorithm」的查询结果

结果 1,353
按分类筛选
显示更多分类
https://www.eeworm.com/dl/519/131167.html 加密解密

传输资料加解密,再以非对称式加密法中...Data Encryption Standard (DES) algorithm,Fast ...经Triple DES CBC 演算法对私密金钥做加密或解

传输资料加解密,再以非对称式加密法中...Data Encryption Standard (DES) algorithm,Fast ...经Triple DES CBC 演算法对私密金钥做加密或解 密.使用者可从网站下载NCNUCA的凭证产生程式,自行产生
下载 129
·
查看 1138
https://www.eeworm.com/dl/665/448400.html matlab例程

This file include the normalized LMS algorithm and subband LMS algorithm. all of them are in m.file

This file include the normalized LMS algorithm and subband LMS algorithm. all of them are in m.file This file can be used to echo noise cancellation, and active noise control
下载 55
·
查看 1082
https://www.eeworm.com/dl/650/258663.html 人工智能/神经网络

One kind of decision-making tree algorithm, can be seen as one kind data mining algorithm ,find the

One kind of decision-making tree algorithm, can be seen as one kind data mining algorithm ,find the rule from large-scale data middle.
下载 155
·
查看 1098
https://www.eeworm.com/dl/519/303372.html 加密解密

DES(Data Encryption Standard) 加密系统的 C 语言源代码

DES(Data Encryption Standard) 加密系统的 C 语言源代码
下载 93
·
查看 1058
https://www.eeworm.com/dl/686/413130.html VC书籍

This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message ...
下载 134
·
查看 1101
https://www.eeworm.com/dl/519/413134.html 加密解密

This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message ...
下载 97
·
查看 1093
https://www.eeworm.com/dl/652/422172.html 文章/文档

this little chapter describe the usage of Encryption methods. author : Hugo Fruehauf I HOPE YO

this little chapter describe the usage of Encryption methods. author : Hugo Fruehauf I HOPE YOU CAN FIND IT NICE AND GOOD. THANKS A LOT JEMO
下载 112
·
查看 1064
https://www.eeworm.com/dl/519/447268.html 加密解密

ABE加密(Attribute-Based Encryption)算法的一种实现方案

ABE加密(Attribute-Based Encryption)算法的一种实现方案
下载 67
·
查看 1226
https://www.eeworm.com/dl/618/134189.html 驱动编程

samsung nand flash k9f series ECC algorithm

samsung nand flash k9f series ECC algorithm
下载 29
·
查看 1121
https://www.eeworm.com/dl/542/283333.html 其他书籍

Burrows Wheeler Transform, Data Compression Algorithm, PDF

Burrows Wheeler Transform, Data Compression Algorithm, PDF
下载 106
·
查看 1098