资源列表

« 1 2 ... .07 .08 .09 .10 .11 6812.13 .14 .15 .16 .17 ... 16274 »

[Linux/Unix编程crash-6.0.0.tar

说明:crash源代码,对linux 发生crash生成的vmcore文件进行分析。-crash source code on linux, the crash generated vmcore files for analysis.
<luzhipeng> 在 2025-11-09 上传 | 大小:25.56mb | 下载:0

[加密解密aes_sbox

说明:The substitution tables (S-boxes) s_box and inv_s_box are used by the expanded key schedule function key_expansion and the en- and decrypting functions cipher and inv_cipher to directly substitute a byte (element of GF(28)) by another byte of the
<darshan> 在 2025-11-09 上传 | 大小:2kb | 下载:0

[加密解密aes_inv_sbox

说明:The inverse S-box is used in the decrypting function inv_cipher to revert the substitution carried out via the S-box. The corresponding AES-Matlab function declared in Line 1 of Listing 7 takes the Sbox (s_box) as its input and generates the in
<darshan> 在 2025-11-09 上传 | 大小:2kb | 下载:0

[加密解密aes_key_expand_128

说明:The key expansion function takes the user supplied 16 bytes long key and utilizes the previously created round constant matrix rcon and the substitution table s_box to generate a 176 byte long key schedule w, which will be used during the en- and
<darshan> 在 2025-11-09 上传 | 大小:1kb | 下载:0

[加密解密aes_rcon

说明:The permutation function rot_word is declared in Line 1 . The input ”word” w_in is a row vector of four bytes and is cyclically permuted according to Figure 13. In Matlab the permutation can easily be achieved by utilizing the new index vector in
<darshan> 在 2025-11-09 上传 | 大小:1kb | 下载:0

[加密解密aes_cipher_top

说明:the first task of the ”main” program aes_demo is a call to aes_init in Line 1. This initialization routine supplies 1 the actual en- and decryption functions (cipher and inv_cipher) with the expanded key schedule w, the substitution tables s_bo
<darshan> 在 2025-11-09 上传 | 大小:2kb | 下载:0

[加密解密jiami-and-jiemi-cPP-class

说明:自己写的加解密c++类,非常实用,输入一个字符串经过加密后输出另一个字符串!-own write jiami and jiemi c++ class
<zjr> 在 2025-11-09 上传 | 大小:2kb | 下载:0

[加密解密shifr

说明: Caesar shift is one of the simplest and most widely known encryption techniques.
<olha_pupkin> 在 2025-11-09 上传 | 大小:1.69mb | 下载:0

[Linux/Unix编程TheDefinitiveGuideToGCC

说明:You will not find more complete coverage of GCC’s features, quirks, and usage anywhere else in a single volume. There are no other up-to-date sources of information on GCC, excluding GCC’s own documentation. GCC usually gets one or two chapters i
<samuel chuang> 在 2025-11-09 上传 | 大小:6.61mb | 下载:0

[加密解密FundamentalsCipher407

说明:Fundemental crytor is use all ciphers library. RC4, SHA1 , SHA256 , SHA512, Rijndael, AES 256-Fundemental crytor is use all ciphers library. RC4, SHA1 , SHA256 , SHA512, Rijndael, AES 256...
<qweqwe> 在 2025-11-09 上传 | 大小:164kb | 下载:0

[加密解密dcpcrypternew

说明:DCP Crypter is use ciphers,hashers. MD5, Md4, base64, aes 256, rijndael, blowfish-DCP Crypter is use ciphers,hashers. MD5, Md4, base64, aes 256, rijndael, blowfish...
<qweqwe> 在 2025-11-09 上传 | 大小:211kb | 下载:0

[系统编程rSpy-Private-Src

说明:rspy, spy software source codes. It s perfect.
<qweqwe> 在 2025-11-09 上传 | 大小:1.26mb | 下载:0
« 1 2 ... .07 .08 .09 .10 .11 6812.13 .14 .15 .16 .17 ... 16274 »

源码中国 www.ymcn.org