代码搜索:Algorithm
找到约 10,000 项符合「Algorithm」的源代码
代码结果 10,000
www.eeworm.com/read/290293/8491497
c repeat.c
/*
Author: Pate Williams (c) 1997
2.143 Algorithm Repeated sqaure-and-mutiply
algorithm for exponentiation in Zn
See "Handbook of Applied Cryptography" by
Alfred J. Menezes et al pag
www.eeworm.com/read/389832/8496543
m mimo2pi.m
% Algorithm "mimo2pi.m"
% Implementation of Node Reduction Algorithm
% and calculation of equivalent pi-shaped
% two-port network.
% Input Parameters:
% - Number of internal and exterior
www.eeworm.com/read/389295/8534992
c sha1c.c
/*
* The Sleuth Kit
*
*/
/* sha1c.c : Implementation of the Secure Hash Algorithm */
/* SHA: NIST's Secure Hash Algorithm */
/* This version written November 2000 by David Ireland of
DI Manag
www.eeworm.com/read/187682/8609602
h md5-util.h
/*
* This code implements the MD5 message-digest algorithm.
* The algorithm is due to Ron Rivest. This code was
* written by Colin Plumb in 1993, no copyright is claimed.
* This code is in the pu
www.eeworm.com/read/187682/8609874
c md5-util.c
/*
* This code implements the MD5 message-digest algorithm.
* The algorithm is due to Ron Rivest. This code was
* written by Colin Plumb in 1993, no copyright is claimed.
* This code is in the pu
www.eeworm.com/read/387787/8653815
c md5.c
/*
* This code implements the MD5 message-digest algorithm.
* The algorithm is due to Ron Rivest. This code was
* written by Colin Plumb in 1993, no copyright is claimed.
* This code is in the pub
www.eeworm.com/read/386996/8714319
c repeat.c
/*
Author: Pate Williams (c) 1997
2.143 Algorithm Repeated sqaure-and-mutiply
algorithm for exponentiation in Zn
See "Handbook of Applied Cryptography" by
Alfred J. Menezes et al pag
www.eeworm.com/read/430775/8728853
m mimo2pi.m
% Algorithm "mimo2pi.m"
% Implementation of Node Reduction Algorithm
% and calculation of equivalent pi-shaped
% two-port network.
% Input Parameters:
% - Number of internal and exterior
www.eeworm.com/read/386752/8728882
m mimo2pi.m
% Algorithm "mimo2pi.m"
% Implementation of Node Reduction Algorithm
% and calculation of equivalent pi-shaped
% two-port network.
% Input Parameters:
% - Number of internal and exterior
www.eeworm.com/read/184366/9107913
c md5.c
/*
* This code implements the MD5 message-digest algorithm.
* The algorithm is due to Ron Rivest. This code was
* written by Colin Plumb in 1993, no copyright is claimed.
* This code is in the pu