代码搜索:Generators
找到约 1,542 项符合「Generators」的源代码
代码结果 1,542
www.eeworm.com/read/387578/2561121
java kdf2bytesgenerator.java
package org.bouncycastle.crypto.generators;
import org.bouncycastle.crypto.DataLengthException;
import org.bouncycastle.crypto.DerivationFunction;
import org.bouncycastle.crypto.DerivationParamet
www.eeworm.com/read/387578/2561125
java deskeygenerator.java
package org.bouncycastle.crypto.generators;
import org.bouncycastle.crypto.CipherKeyGenerator;
import org.bouncycastle.crypto.params.DESParameters;
public class DESKeyGenerator
extends Cip
www.eeworm.com/read/267614/4264948
conf app.conf
TELNET 0 5 100S 0S
# The traffic generators currently available are FTP,
# FTP/GENERIC, TELNET, CBR, and HTTP.
#
# ---------------------------------------------------------------
# 1. FTP
#
# FTP
www.eeworm.com/read/160105/5576938
conf app.conf
TELNET 0 5 100S 0S
# The traffic generators currently available are FTP,
# FTP/GENERIC, TELNET, CBR, and HTTP.
#
# ---------------------------------------------------------------
# 1. FTP
#
# FTP
www.eeworm.com/read/473751/6839215
readme
#
# PN Sequences Generator Library
# Copyright (C) 2000 Byoungjo CHOI, See COPYING for the copyright notice.
#
A set of sequence generators for CDMA study is provided in this directory.
Type "make"
www.eeworm.com/read/173076/9675394
m randrand.m
% RANDRAND - Reset both Random Number Generator Seeds to the clock
% Copyright (c) 1998, Harvard University. Full copyright in the file Copyright
%
% Note: there are two random number generators in M
www.eeworm.com/read/267609/11170904
m randrand.m
% RANDRAND - Reset both Random Number Generator Seeds to the clock
% Copyright (c) 1998, Harvard University. Full copyright in the file Copyright
%
% Note: there are two random number generators in M
www.eeworm.com/read/179775/9339233
html 16-02.html
APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Pseudo-Random-Sequence Generators and Stream Ciphers
www.eeworm.com/read/179775/9339235
html 16-04.html
APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Pseudo-Random-Sequence Generators and Stream Ciphers
www.eeworm.com/read/179775/9339237
html 16-03.html
APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Pseudo-Random-Sequence Generators and Stream Ciphers