代码搜索:如何学习 Handbook?

找到约 10,000 项符合「如何学习 Handbook?」的源代码

代码结果 10,000
www.eeworm.com/read/454651/7386176

txt readme.txt

本资料仅供学习评估之用,请勿用于商业用途!请在学习评估24小时内删除.
www.eeworm.com/read/290293/8491276

c sha1.c

/* Author: Pate Williams (c) 1997 Secure hash algorithm updated version. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al editors, 9.53 Algorithm page 348. */ #i
www.eeworm.com/read/290293/8491282

c testdes3.c

/* Author: Pate Williams (c) 1997 Triple DES (EDE) based upon: 7.82 Algorithm Data Encryption Standard See "Handbook of Applied Cryptography" by Alfred J. Menezes et al page 253.
www.eeworm.com/read/290293/8491321

c mmohash.c

/* Author: Pate Williams (c) 1997 9.41 Algorithm Matyas-Meyer-Oseas hash See "Handbook of Applied Cryptography" by Alfred J. Menezes et al page 341. The message to be hashed is assum
www.eeworm.com/read/290293/8491332

c esign.c

/* Author: Pate Williams (c) 1997 ESIGN digital signature scheme. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al Section 11.7.2 pages 473 - 474. */ #include
www.eeworm.com/read/290293/8491385

c sdrec.c

/* Author: Pate Williams (c) 1997 Signed-digit exponent recoding. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al 14.7.1 Section pages 627 - 628. */ #inclu
www.eeworm.com/read/290293/8491411

c mpqs.c

/* Author: Pate Williams (c) 1997 Quadratic sieve factoring algorithm. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al 3.21 Algorithm page 96. Also see "A Course in
www.eeworm.com/read/290293/8491420

c miller.c

/* Author: Pate Williams (c) 1997 4.24 Algorithm Miller-Rabin probabilistic primality test. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al page 139. */ #i
www.eeworm.com/read/290293/8491423

c fbcomb.c

/* Author: Pate Williams (c) 1997 Fixed-base comb method for exponentiation. See "Handbook of Applied Cryptography" by Alfred J. Menezes et al 14.6.3 Section pages 623 - 627. */
www.eeworm.com/read/290293/8491442

c garner.c

/* Author: Pate Williams (c) 1997 14.71 Algorithm Garner's Algorithm for CRT See "Handbook of Applied Cryptography" by Alfred J. Menezes et al page 612. */ #include