资源列表

« 1 2 ... .61 .62 .63 .64 .65 15466.67 .68 .69 .70 .71 ... 16274 »

[系统编程sbzrcecode

说明:mybatis-generator-core-1,3,2 Java source code-Mybatis generator- core- 1 31 Java source code
<Caesbr> 在 2025-07-24 上传 | 大小:251kb | 下载:0

[系统编程9053818

说明:RandomAccessFile 对文件操作,很好用的哟,不错的东西-RandomAccessFile for file operations, very useful yo, nice stuff
<ZOJkrux$9137> 在 2025-07-24 上传 | 大小:2kb | 下载:0

[CA认证prob3

说明:Miller-Rabin test is a primality test algorithm which determines whether a given number is prime or not. Implement Miller-Rabin primality test as given in the text book page 257, Algorithm 7.44. (aN− 1 6= 1 mod N) Write three functions to
<jitender grover> 在 2025-07-24 上传 | 大小:1kb | 下载:0

[CA认证4

说明:Cryptographic Hash Functions: A cryptographic hash function must have at least two security properties: collision free and Hiding. Collision free property ensures that for a given function H, no one can find x and y such that H(x) = H(y). The hid
<jitender grover> 在 2025-07-24 上传 | 大小:1kb | 下载:0

[CA认证discrete_log

说明:Solve descrete log problem using meet in the middle attack. More formally, write a program to compute discrete log modulo a prime p. Let g be some element in Z p and suppose you are given h in Z p such that h = gx where 1 ≤ x ≤ 240. Your goal
<jitender grover> 在 2025-07-24 上传 | 大小:1kb | 下载:0

[CA认证diffie_hellman

说明:Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random number mod p. Now generate A,
<jitender grover> 在 2025-07-24 上传 | 大小:1kb | 下载:0

[CA认证q1

说明:Consider an organization with three roles: A, B and C. Whenever B has to issue some instruction to A, B has to take permission via C and then only it will be obeyed by A. This permission is issued with the help of a digital signature. A verifies
<jitender grover> 在 2025-07-24 上传 | 大小:1kb | 下载:0

[系统编程glorartree

说明:source code for the examples Mike Smith s book Java-The source code for the examples Mike Smith s book Java
<Bqnnie> 在 2025-07-24 上传 | 大小:175kb | 下载:0

[系统编程the

说明:Press the form into the system tray
<imifehv> 在 2025-07-24 上传 | 大小:9kb | 下载:0

[系统编程217908

说明:QQ 2005 贺岁版登录口令加密算法原理以及C++,VB源代码,-2005 new edition QQ login password encryption algorithm principle and c++, VB source code,
<mqrlzve> 在 2025-07-24 上传 | 大小:122kb | 下载:0

[系统编程608983

说明:Shut down, save the file first when you try
<list_bfc> 在 2025-07-24 上传 | 大小:4kb | 下载:0

[Linux/Unix编程netlink

说明:linux下netlink机制实现通信,自己写的小程序实现内核与用户通信,代码十分精简且注释完整,内附有makefile编译文件和使用说明,还有学习文档-Linux u4E0Bnetlink u673A u5239 u5B0 u90B1 u901A u4FE1 uFF0C u81EA u5DF1 u5199 u7684 u5C0F u7A0B u5B9E u7B0 u5185 u6838 u4E0E u7528 u6237 u901A u4FE1
<林凯> 在 2025-07-24 上传 | 大小:25kb | 下载:0
« 1 2 ... .61 .62 .63 .64 .65 15466.67 .68 .69 .70 .71 ... 16274 »

源码中国 www.ymcn.org