代码搜索:Recovery

找到约 1,119 项符合「Recovery」的源代码

代码结果 1,119
www.eeworm.com/read/427960/8909633

cpp limlee.cpp

/* * Lim-Lee prime generation * * See "A Key recovery Attack on Discrete Log-based Schemes using a Prime * Order Subgroup", Lim & Lee, Crypto '97 * * For certain Discrete Log base
www.eeworm.com/read/284630/8912684

key zcommdoc.key

Manual for ZCOMM 18.18, shareware cousin to Pro-YAM with ZMODEM, YMODEM, Telink/FIDO, SEAlink, MODEM7, and XMODEM (with Enhanced Data Recovery), MobyKermit, SuperKermit (Sliding Windows), Compuserve B
www.eeworm.com/read/182760/9192386

m dct1_recover.m

%Name: Chris Shoemaker %Course: EER-280 - Digital Watermarking %Project: Block DCT Based method, using comparision between mid-band coeffcients % Watermark Recovery clear all; % s
www.eeworm.com/read/374163/9419280

c newgrp.c

/* setgrp.c - by Michael Haardt. Set the gid if possible */ /* Added a bit more error recovery/reporting - poe */ /* Vesa Roukonen added code for asking password */ /* Currently maintained at ftp://ft
www.eeworm.com/read/170521/9801900

dpr rescue.dpr

{ Bugs: TODO: * add boot sector recovery for FAT12/16 * improve detect "quick-formatted" disks (=> cleared ZIP is not formatted!) * improve MPEG file detection * test Multibyte char
www.eeworm.com/read/365688/9851329

dpr rescue.dpr

{ Bugs: TODO: * add boot sector recovery for FAT12/16 * improve detect "quick-formatted" disks (=> cleared ZIP is not formatted!) * improve MPEG file detection * test Multibyte char
www.eeworm.com/read/168757/9898245

dpr rescue.dpr

{ Bugs: TODO: * add boot sector recovery for FAT12/16 * improve detect "quick-formatted" disks (=> cleared ZIP is not formatted!) * improve MPEG file detection * test Multibyte char
www.eeworm.com/read/349903/10785388

c limlee.c

/* * Lim-Lee prime generation * * See "A Key recovery Attack on Discrete Log-based Schemes using a Prime * Order Subgroup", Lim & Lee, Crypto '97 * * For certain Discrete Log base
www.eeworm.com/read/349903/10786031

cpp limlee.cpp

/* * Lim-Lee prime generation * * See "A Key recovery Attack on Discrete Log-based Schemes using a Prime * Order Subgroup", Lim & Lee, Crypto '97 * * For certain Discrete Log base
www.eeworm.com/read/447000/7561289

m dct1_recover.m

%Name: Chris Shoemaker %Course: EER-280 - Digital Watermarking %Project: Block DCT Based method, using comparision between mid-band coeffcients % Watermark Recovery clear all; % s