代码搜索:Recovery

找到约 1,119 项符合「Recovery」的源代码

代码结果 1,119
www.eeworm.com/read/240854/13192989

txt readme.txt

GPIO JTAG Recovery This example demonstrates changing the JTAG pins into GPIOs, along with a mechanism to revert them to JTAG pins. When first run, the pins remain in JTAG mode. Pressing the us
www.eeworm.com/read/240853/13193316

txt readme.txt

GPIO JTAG Recovery This example demonstrates changing the JTAG pins into GPIOs, along with a mechanism to revert them to JTAG pins. When first run, the pins remain in JTAG mode. Pressing the us
www.eeworm.com/read/325171/13221264

m dct1_recover.m

%Name: Chris Shoemaker %Course: EER-280 - Digital Watermarking %Project: Block DCT Based method, using comparision between mid-band coeffcients % Watermark Recovery clear all; % s
www.eeworm.com/read/320227/13430503

m dct1_recover.m

%Name: Chris Shoemaker %Course: EER-280 - Digital Watermarking %Project: Block DCT Based method, using comparision between mid-band coeffcients % Watermark Recovery clear all; % s
www.eeworm.com/read/318176/13484077

c limlee.c

/* * Lim-Lee prime generation * * See "A Key recovery Attack on Discrete Log-based Schemes using a Prime * Order Subgroup", Lim & Lee, Crypto '97 * * For certain Discrete Log base
www.eeworm.com/read/318176/13484323

cpp limlee.cpp

/* * Lim-Lee prime generation * * See "A Key recovery Attack on Discrete Log-based Schemes using a Prime * Order Subgroup", Lim & Lee, Crypto '97 * * For certain Discrete Log base
www.eeworm.com/read/494289/6381489

c limlee.c

/* * Lim-Lee prime generation * * See "A Key recovery Attack on Discrete Log-based Schemes using a Prime * Order Subgroup", Lim & Lee, Crypto '97 * * For certain Discrete Log base
www.eeworm.com/read/494289/6381772

cpp limlee.cpp

/* * Lim-Lee prime generation * * See "A Key recovery Attack on Discrete Log-based Schemes using a Prime * Order Subgroup", Lim & Lee, Crypto '97 * * For certain Discrete Log base
www.eeworm.com/read/263516/11359503

m fm_exload.m

function fm_exload(flag) % FM_EXLOAD defines exponential recovery load % % FM_EXLOAD(FLAG) % FLAG = 0 -> initialization % FLAG = 1 -> algebraic equations % FLAG = 2 -> algebra
www.eeworm.com/read/156908/11752889

c limlee.c

/* * Lim-Lee prime generation * * See "A Key recovery Attack on Discrete Log-based Schemes using a Prime * Order Subgroup", Lim & Lee, Crypto '97 * * For certain Discrete Log base