搜索:keys

找到约 60 项符合「keys」的查询结果

结果 60
https://www.eeworm.com/dl/534/319290.html 其他

four Responder the realization host keys to remove the keys

four Responder the realization host keys to remove the keys
下载 57
·
查看 1036
https://www.eeworm.com/dl/668/427225.html 其他行业

Editor de keys para chip Ali

Editor de keys para chip Ali
下载 55
·
查看 1088
https://www.eeworm.com/dl/534/466392.html 其他

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough dat

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much ...
下载 82
·
查看 1133
https://www.eeworm.com/dl/687/432864.html 其他嵌入式/单片机内容

Bascom 8051 program for matrix keyboard 4X3 keys

Bascom 8051 program for matrix keyboard 4X3 keys
下载 119
·
查看 1130
https://www.eeworm.com/dl/519/440580.html 加密解密

Kaspersky2009的最新keys。KAS 和KIS 都有

Kaspersky2009的最新keys。KAS 和KIS 都有
下载 156
·
查看 1080
https://www.eeworm.com/dl/666/429013.html Delphi控件源码

Permits to negotiate of simple form (without code) some of the most utilized combinations of keys i

Permits to negotiate of simple form (without code) some of the most utilized combinations of keys in the forms. It suffices with freeing the component on the form and to activate the properties desired segun the behavior that want. * ENTER to change of field. * ESC to cl ...
下载 50
·
查看 1094
https://www.eeworm.com/dl/692/472180.html 行业发展研究

A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digi

A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or more certificate issuers as trust ...
下载 89
·
查看 1087
https://www.eeworm.com/dl/640/444418.html CA认证

Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2

Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Play ...
下载 143
·
查看 1107
https://www.eeworm.com/dl/519/457412.html 加密解密

VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in li

VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, ...
下载 144
·
查看 1103
https://www.eeworm.com/dl/619/201822.html Linux/Unix编程

About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based o

About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packe ...
下载 188
·
查看 1170