代码搜索:如何学习 Handbook?

找到约 10,000 项符合「如何学习 Handbook?」的源代码

代码结果 10,000
www.eeworm.com/read/290293/8491490

c lehmer.c

/* Author: Pate Williams (c) 1997 14.57 Algorithm Lehmer's gcd algorithm See "Handbook of Applied Cryptography" by Alfred J. Menezes et al page 607. */ #include
www.eeworm.com/read/290293/8491506

c exteuc.c

/* Author: Pate Williams (c) 1997 2.107 Algorithm Extended Euclidean algorithm See "Handbook of Applied Cryptography" by Alfred J. Menezes et al page 67. */ #include #d
www.eeworm.com/read/386996/8714056

c sha1.c

/* Author: Pate Williams (c) 1997 Secure hash algorithm updated version. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al editors, 9.53 Algorithm page 348. */ #i
www.eeworm.com/read/386996/8714060

c testdes3.c

/* Author: Pate Williams (c) 1997 Triple DES (EDE) based upon: 7.82 Algorithm Data Encryption Standard See "Handbook of Applied Cryptography" by Alfred J. Menezes et al page 253.
www.eeworm.com/read/386996/8714101

c mmohash.c

/* Author: Pate Williams (c) 1997 9.41 Algorithm Matyas-Meyer-Oseas hash See "Handbook of Applied Cryptography" by Alfred J. Menezes et al page 341. The message to be hashed is assum
www.eeworm.com/read/386996/8714115

c esign.c

/* Author: Pate Williams (c) 1997 ESIGN digital signature scheme. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al Section 11.7.2 pages 473 - 474. */ #include
www.eeworm.com/read/386996/8714165

c sdrec.c

/* Author: Pate Williams (c) 1997 Signed-digit exponent recoding. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al 14.7.1 Section pages 627 - 628. */ #inclu
www.eeworm.com/read/386996/8714191

c mpqs.c

/* Author: Pate Williams (c) 1997 Quadratic sieve factoring algorithm. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al 3.21 Algorithm page 96. Also see "A Course in
www.eeworm.com/read/386996/8714203

c miller.c

/* Author: Pate Williams (c) 1997 4.24 Algorithm Miller-Rabin probabilistic primality test. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al page 139. */ #i
www.eeworm.com/read/386996/8714207

c fbcomb.c

/* Author: Pate Williams (c) 1997 Fixed-base comb method for exponentiation. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al 14.6.3 Section pages 623 - 627. */