代码搜索:如何学习 Handbook?
找到约 10,000 项符合「如何学习 Handbook?」的源代码
代码结果 10,000
www.eeworm.com/read/172784/9690398
tab veriuser_vcs.tab
// Example Synopsys VCS PLI table to register PLI applications
// For the book, "The Verilog PLI Handbook"
$list_pathout_ports data=0 check=PLIbook_ListPorts_checktf call=PLIbook_ListPorts
www.eeworm.com/read/172784/9690468
tab veriuser_vcs.tab
// Example Synopsys VCS PLI table to register PLI applications
// For the book, "The Verilog PLI Handbook"
$my_strobe data=0 check=PLIbook_MyStrobe_checktf call=PLIbook_MyStrobe_c
www.eeworm.com/read/134379/13994149
h fdreg.h
#ifndef _LINUX_FDREG_H
#define _LINUX_FDREG_H
/*
* This file contains some defines for the floppy disk controller.
* Various sources. Mostly "IBM Microcomputers: A Programmers
* Handbook", Sanches
www.eeworm.com/read/109477/15556489
h fdreg.h
#ifndef _LINUX_FDREG_H
#define _LINUX_FDREG_H
/*
* This file contains some defines for the floppy disk controller.
* Various sources. Mostly "IBM Microcomputers: A Programmers
* Handbook", Sanches
www.eeworm.com/read/105179/15676055
h fdreg.h
#ifndef _LINUX_FDREG_H
#define _LINUX_FDREG_H
/*
* This file contains some defines for the floppy disk controller.
* Various sources. Mostly "IBM Microcomputers: A Programmers
* Handbook", Sanches
www.eeworm.com/read/102625/15764610
c blumblum.c
/*
Author: Pate Williams (c) 1997
The following program implements and tests the
Blum-Blum-Shub random bits generator. The test
suite is according to FIPS 140-1. See "Handbook
of App
www.eeworm.com/read/102625/15764618
c addchain.c
/*
Author: Pate Williams (c) 1997
Addition chain exponentiation. See "Handbook of
Applied Cryptography" by Alfred J. Menezes et al
14.6.2 Section pages 620 - 623.
*/
#include
www.eeworm.com/read/102625/15764642
c index.c
/*
Author: Pate Williams (c) 1997
Index-calculus algorithm for computing discrete
logarithms. See "Handbook of Applied Cryptography"
by Alfred J. Menezes et al 3.6.5 Section 3.68
Alg
www.eeworm.com/read/102625/15764643
c knapsack.c
/*
Author: Pate Williams (c) 1997
Solution of the subset problem using LLL
reduction. See "Handbook of Applied
Cryptography" by Alfred J. Menezes et al
pages 120 - 121.
*/
#inclu
www.eeworm.com/read/102625/15764646
c mpmul.c
/*
Author: Pate Williams (c) 1997
Multiple-precision multiplication. See "Handbook
of Applied Cryptography" by Alfred J. Menezes et
al 14.2.3 Section pages 595 - 596.
*/
#include