代码搜索:如何学习 Handbook?
找到约 10,000 项符合「如何学习 Handbook?」的源代码
代码结果 10,000
www.eeworm.com/read/290293/8491490
c lehmer.c
/*
Author: Pate Williams (c) 1997
14.57 Algorithm Lehmer's gcd algorithm
See "Handbook of Applied Cryptography" by Alfred
J. Menezes et al page 607.
*/
#include
www.eeworm.com/read/290293/8491506
c exteuc.c
/*
Author: Pate Williams (c) 1997
2.107 Algorithm Extended Euclidean algorithm
See "Handbook of Applied Cryptography" by
Alfred J. Menezes et al page 67.
*/
#include
#d
www.eeworm.com/read/386996/8714056
c sha1.c
/*
Author: Pate Williams (c) 1997
Secure hash algorithm updated version.
See "Handbook of Applied Cryptography"
by Alfred J. Menezes et al editors,
9.53 Algorithm page 348.
*/
#i
www.eeworm.com/read/386996/8714060
c testdes3.c
/*
Author: Pate Williams (c) 1997
Triple DES (EDE) based upon:
7.82 Algorithm Data Encryption Standard
See "Handbook of Applied Cryptography"
by Alfred J. Menezes et al page 253.
www.eeworm.com/read/386996/8714101
c mmohash.c
/*
Author: Pate Williams (c) 1997
9.41 Algorithm Matyas-Meyer-Oseas hash
See "Handbook of Applied Cryptography"
by Alfred J. Menezes et al page 341.
The message to be hashed is assum
www.eeworm.com/read/386996/8714115
c esign.c
/*
Author: Pate Williams (c) 1997
ESIGN digital signature scheme. See "Handbook of
Applied Cryptography" by Alfred J. Menezes et al
Section 11.7.2 pages 473 - 474.
*/
#include
www.eeworm.com/read/386996/8714165
c sdrec.c
/*
Author: Pate Williams (c) 1997
Signed-digit exponent recoding. See "Handbook of
Applied Cryptography" by Alfred J. Menezes et al
14.7.1 Section pages 627 - 628.
*/
#inclu
www.eeworm.com/read/386996/8714191
c mpqs.c
/*
Author: Pate Williams (c) 1997
Quadratic sieve factoring algorithm. See
"Handbook of Applied Cryptography" by
Alfred J. Menezes et al 3.21 Algorithm page 96.
Also see "A Course in
www.eeworm.com/read/386996/8714203
c miller.c
/*
Author: Pate Williams (c) 1997
4.24 Algorithm Miller-Rabin probabilistic primality
test. See "Handbook of Applied Cryptography" by
Alfred J. Menezes et al page 139.
*/
#i
www.eeworm.com/read/386996/8714207
c fbcomb.c
/*
Author: Pate Williams (c) 1997
Fixed-base comb method for exponentiation. See
"Handbook of Applied Cryptography" by Alfred J.
Menezes et al 14.6.3 Section pages 623 - 627.
*/