代码搜索:Recovery
找到约 1,119 项符合「Recovery」的源代码
代码结果 1,119
www.eeworm.com/read/240854/13192989
txt readme.txt
GPIO JTAG Recovery
This example demonstrates changing the JTAG pins into GPIOs, along with a
mechanism to revert them to JTAG pins. When first run, the pins remain in JTAG
mode. Pressing the us
www.eeworm.com/read/240853/13193316
txt readme.txt
GPIO JTAG Recovery
This example demonstrates changing the JTAG pins into GPIOs, along with a
mechanism to revert them to JTAG pins. When first run, the pins remain in JTAG
mode. Pressing the us
www.eeworm.com/read/325171/13221264
m dct1_recover.m
%Name: Chris Shoemaker
%Course: EER-280 - Digital Watermarking
%Project: Block DCT Based method, using comparision between mid-band coeffcients
% Watermark Recovery
clear all;
% s
www.eeworm.com/read/320227/13430503
m dct1_recover.m
%Name: Chris Shoemaker
%Course: EER-280 - Digital Watermarking
%Project: Block DCT Based method, using comparision between mid-band coeffcients
% Watermark Recovery
clear all;
% s
www.eeworm.com/read/318176/13484077
c limlee.c
/*
* Lim-Lee prime generation
*
* See "A Key recovery Attack on Discrete Log-based Schemes using a Prime
* Order Subgroup", Lim & Lee, Crypto '97
*
* For certain Discrete Log base
www.eeworm.com/read/318176/13484323
cpp limlee.cpp
/*
* Lim-Lee prime generation
*
* See "A Key recovery Attack on Discrete Log-based Schemes using a Prime
* Order Subgroup", Lim & Lee, Crypto '97
*
* For certain Discrete Log base
www.eeworm.com/read/494289/6381489
c limlee.c
/*
* Lim-Lee prime generation
*
* See "A Key recovery Attack on Discrete Log-based Schemes using a Prime
* Order Subgroup", Lim & Lee, Crypto '97
*
* For certain Discrete Log base
www.eeworm.com/read/494289/6381772
cpp limlee.cpp
/*
* Lim-Lee prime generation
*
* See "A Key recovery Attack on Discrete Log-based Schemes using a Prime
* Order Subgroup", Lim & Lee, Crypto '97
*
* For certain Discrete Log base
www.eeworm.com/read/263516/11359503
m fm_exload.m
function fm_exload(flag)
% FM_EXLOAD defines exponential recovery load
%
% FM_EXLOAD(FLAG)
% FLAG = 0 -> initialization
% FLAG = 1 -> algebraic equations
% FLAG = 2 -> algebra
www.eeworm.com/read/156908/11752889
c limlee.c
/*
* Lim-Lee prime generation
*
* See "A Key recovery Attack on Discrete Log-based Schemes using a Prime
* Order Subgroup", Lim & Lee, Crypto '97
*
* For certain Discrete Log base