代码搜索:如何学习 Handbook?

找到约 10,000 项符合「如何学习 Handbook?」的源代码

代码结果 10,000
www.eeworm.com/read/469022/1482848

txt mynormalthread.csproj.filelistabsolute.txt

H:\学习资料\并行计算\ExperimentsOfParallelAlgorithms\myNormalThread\bin\Debug\myNormalThread.exe H:\学习资料\并行计算\ExperimentsOfParallelAlgorithms\myNormalThread\bin\Debug\myNormalThread.pdb H:\学习资料\并行计算\Experim
www.eeworm.com/read/290293/8491291

c idea.c

/* Author: Pate Williams (c) 1997 IDEA (International Data Encryption Algorithm). See "Handbook of Applied Cryptography" by Alfred J. Menezes et al 7.6 Section pages 263 - 266. */ #
www.eeworm.com/read/290293/8491349

c monty.c

/* Author: Pate Williams (c) 1997 Montgomery reduction. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al Section 14.3.2 pages 600 - 603. */ #include
www.eeworm.com/read/290293/8491352

c maurer.c

/* Author: Pate Williams (c) 1997 Maurer's algorithm for generating provable primes. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al page 153. */ #include
www.eeworm.com/read/290293/8491396

c addchain.c

/* Author: Pate Williams (c) 1997 Addition chain exponentiation. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al 14.6.2 Section pages 620 - 623. */ #includ
www.eeworm.com/read/290293/8491434

c micali.c

/* Author: Pate Williams (c) 1997 The following program implements and tests the Micali-Schnorr random bits generator. The test suite is according to FIPS 140-1. See "Handbook of App
www.eeworm.com/read/290293/8491445

c montmult.c

/* Author: Pate Williams (c) 1997 Montgomery multiplication. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al Section 14.3.2 pages 600 - 603. */ #include
www.eeworm.com/read/290293/8491464

c mpmul.c

/* Author: Pate Williams (c) 1997 Multiple-precision multiplication. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al 14.2.3 Section pages 595 - 596. */ #in
www.eeworm.com/read/290293/8491493

c montexpo.c

/* Author: Pate Williams (c) 1997 Montgomery exponentiation. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al Section 14.6.1 pages 614 - 620. */ #include
www.eeworm.com/read/387434/8677364

xml sample.xml

Mastering Delphi 6 Cantu Delphi Developer's Handbook