加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]
标签: Cryptographic Primitives generate Library
上传时间: 2015-07-16
上传用户:wqxstar
Software Engineering is a discipline applied by teams to produce high-quality, large-scale, cost-effective software that satisfies the users’ needs, and can be maintained over time Software Development is a weaker term where standards, tools, processes, etc. may not be applied
标签: high-quality Engineering large-scale discipline
上传时间: 2014-01-09
上传用户:bcjtao
palm编成,这种书很少,有兴趣看看 Title: Palm Programming: The Developer s Guide URL: http://safari.oreilly.com/JVXSL.asp?x=1&mode=section&sortKey=rank&sortOrder=desc&view=book&xmlid=1-56592-525-4&open=false&srchText=palm+programming&code=&h=&m=&l=1&catid=&s=1&b=1&f=1&t=1&c=1&u=1&page=0 ISBN: 1-56592-525-4 Author: Julie McKeehan/ Neil Rhodes Publisher: O Reilly Page: 478 Edition: 1st edition (December 1998) Catalog: PDA programming / Palm Format: pdf Size: 2.06M Supplier: Summary: Emerging as the bestselling hand-held computers of all time, PalmPilots have spawned intense developer activity and a fanatical following. Used by Palm in their developer training, this tutorial-style book shows intermediate to experienced C programmers how to build a Palm application from the ground up. Includes a CD-ROM with source code and third-party developer tools
标签: Programming Developer oreilly safari
上传时间: 2013-12-10
上传用户:litianchu
acm HDOJ 1051WoodenSticks Description: There is a pile of n wooden sticks. The length and weight of each stick are known in advance. The sticks are to be processed by a woodworking machine in one by one fashion. It needs some time, called setup time, for the machine to prepare processing a stick. The setup times are associated with cleaning operations and changing tools and shapes in the machine. The setup times of the woodworking machine are given as follows: (a) The setup time for the first wooden stick is 1 minute. (b) Right after processing a stick of length l and weight w , the machine will need no setup time for a stick of length l and weight w if l<=l and w<=w . Otherwise, it will need 1 minute for setup.
标签: WoodenSticks Description length wooden
上传时间: 2014-03-08
上传用户:netwolf
小程序应有如下功能: 1、登记。登记每位同学的上网卡号,押金(>=5 RMB)和上网时刻。 2、查询。可以查询每个上网卡号的上网时刻,上网的时间,押金和当前的费用。 3、结账。根据卡号可以算出 应收金额,应找金额。 4、提醒。当某个上网卡号的 上网费用 >= 它的押金时应提醒管理员。 5、续费。当某个上网卡号的 上网费用 >= 它的押金,他可以再次交上一定金额的押金(>=5 RMB)。 6、修改费率。上网的费率应可以调整。默认的费率是1 RMB /1小时。 为了不让机房赔本,应是这样的收费模式:先付钱后上网。如上机就五角, 以后过半小时收五角。 7、总账。一天下来管理员要知道这天他赚了多少RMB。 你需要考虑程序被意外结束等特殊情况。 如果你的程序是按系统时间进行计时,还应考虑系统时间被意外更改的特殊情况。总之,你应考虑一切会让你的程序不能正常运行的特殊情况。 如果不知道怎么计时,你可以学习参考使用<time.h>中函数。 说明: a. 假定机房有150台机器。 b. 假定初始的费率是1 RMB /1分钟(便于测试)。
上传时间: 2016-06-27
上传用户:gut1234567
The task of clustering Web sessions is to group Web sessions based on similarity and consists of maximizing the intra- group similarity while minimizing the inter-group similarity. The first and foremost question needed to be considered in clustering W b sessions is how to measure the similarity between Web sessions.However.there are many shortcomings in traditiona1 measurements.This paper introduces a new method for measuring similarities between Web pages that takes into account not only the URL but also the viewing time of the visited web page.Yhen we give a new method to measure the similarity of Web sessions using sequence alignment and the similarity of W eb page access in detail Experiments have proved that our method is valid and e币cient.
标签: sessions clustering similarity Web
上传时间: 2014-01-11
上传用户:songrui
made by: kangkai data:2008.11.23 this one is used to test arm7 str71x. use a led to test GPIO. a---------P0.0 b---------P0.1 c---------P0.2 d---------P0.3 e---------P0.4 f---------P0.5 g---------P0.6 just run it and you will see the led to show 0-9 all the time.
上传时间: 2016-12-16
上传用户:moerwang
This small utility helps to generate seven segment display codes for different I/O connections. For example, AVR/PIC Port A.0 -> D Segment Port A.1 -> B Segment .... Also it can generate Common Cathode or Common Anode table codes.. I Coded it long time ago. I Hope help someone. Thank you
标签: connections different generate display
上传时间: 2014-01-17
上传用户:开怀常笑
This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It s detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive.
标签: up-to-date only cutting-edge material
上传时间: 2017-07-09
上传用户:comua
Computing and the way people use C for doing it keeps changing as years go by. So overwhelming has been the response to all the previous editions of “Let Us C” that I have now decided that each year I would come up with a new edition of it so that I can keep the readers abreast with the way C is being used at that point in time.
标签: overwhelming Computing changing people
上传时间: 2013-12-23
上传用户:epson850