没有合适的资源?快使用搜索试试~
我知道了~
文库首页
安全技术
系统安全
Final Report on Main Computational Assumptions in Cryptography看看总结
Final Report on Main Computational Assumptions in Cryptography看看...
需积分: 14
24 下载量
53 浏览量
2015-12-06
10:31:17
上传
评论
1
收藏
416KB
PDF
举报
温馨提示
立即下载
密码学难题集合,便于密码学习者一目对困难问题一目了然,是密码学习的好帮手。
资源推荐
资源评论
密码学中的计算假设
浏览:19
介绍了密码学中常用的一些数学假设,及其对应的密码算法
final report on link level and system level channel models
浏览:20
5星 · 资源好评率100%
final report on link level and system level channel models D5.4
Cryptography in .NET Succinctly(SyncFusion,2015)
浏览:78
Throughout history, cryptography has been used to confidentially pass messages to different recipients. This has been especially useful in times of war. Up until World War II, with the use of the Germ
Tutorials on the Foundations of Cryptography 17
浏览:124
5星 · 资源好评率100%
This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters explain aspects of garbled circuits, public-key cryptography,
Computational methods in Finance
浏览:46
Computational methods in Finance, Hirsa。计算金融必备的入门书籍
big data and computational intelligence in networking
浏览:84
big data and computational intelligence in networking
Computational Geometry in C - J o'orourk.pdf
浏览:119
5星 · 资源好评率100%
Computational Geometry in C - J o'orourk.pdf !!!!!!!!!!!!
Computational Methods in Financial Engineering
浏览:159
Computational Methods in Financial Engineering Computational Methods in Financial Engineering
Computational Geometry in C
浏览:153
5星 · 资源好评率100%
This is the newly revised and expanded edition of the popular introduction to the design and implementation of geometry algorithms arising in areas such as computer graphics, robotics, and engineering
The Finite Volume Method in Computational Fluid Dynamics
浏览:140
This textbook explores both the theoretical foundation of the Finite Volume Method (FVM) and its applications in Computational Fluid Dynamics (CFD). Readers will discover a thorough explanation of the
Computational Intelligence in Data Mining
浏览:172
这是关于计算智能的论文集,高清,最新版,经典著作,英文版
Computational Intelligence in Manufacturing Handbook - Jun Wang.pdf
浏览:46
Computational Intelligence in Manufacturing Handbook - Jun Wang.pdf Computational Intelligence in Manufacturing Handbook - Jun Wang.pdf
Recent Advances in Computational Intelligence in Defense and Security
浏览:186
这是关于计算智能的电子书,高清,最新版本,经典著作,英文版
Computational Methods in Elasticity and Plasticity
浏览:170
5星 · 资源好评率100%
弹塑性力学英文书籍,建立数学模型,弹性本构方程,固体有限元分析
Computational Intelligence in Biomedical Imaging
浏览:156
Computational Intelligence in Biomedical Imaging
Big Data and Computational Intelligence in Networking-CRC(2018).pdf
浏览:68
However, the unstructured, heterogeneous, sheer volume and complex nature of network big data pose great challenges on the computational intelligence of these emerging analytical techniques due to ...
Studies in Computational Intelligence
浏览:146
The series “Studies in Computational Intelligence” (SCI) publishes new develop- ments and advances in the various areas of computational intelligence—quickly and with a high quality. The intent is ...
Computational Methods For PDE In Mechanics
浏览:132
- An application-oriented introduction to computational numerical methods for PDE - Complete with numerous exercise sets and solutions - Includes Windows programs in C++ language
Handbook of Research on Computational Methodologies in Gene Regulatory Networks
浏览:174
5星 · 资源好评率100%
in Genetic Regulatory Networks ......................................................................................................... 169 Manuel Barrio, University of Valladolid, Spain Kevin ...
雷蛇PUBG鼠标宏-雷蛇鼠标驱动
浏览:19
5星 · 资源好评率100%
需要下载雷云3导入
WishRecy数据恢复软件
浏览:11
WishRecy 1、支持多种设备:硬盘、移动硬盘、U盘、sd卡、内存卡、相机卡、手机卡等多种存储设备; 2、支持多种分区方式和文件系统:传统的MBR分区方式、最新GPT分区方式、动态磁盘卷、FAT16/FAT32/NTFS/exFAT/Ext3/Ext4等文件系统; 3、支持多种文件格式:jpg、jpeg、bmp、png等常见图片格式,doc、xls、ppt等办公文件格式,html、PHP、
Synaptics病毒专杀工具
浏览:191
清除病毒,并恢复被病毒破坏的文件。 伪装成“Synaptics触摸板驱动程序”的新型蠕虫病毒,既可以通过带有恶意宏代码的Excel文档传播,也可以通过对正常的EXE文件进行偷梁换柱(将正常的EXE文件内容复制更新到病毒自身的资源段中)的方式传播。 当机器感染该病毒后,其会拦截用户新建Excel文档或者打开Excel文档的行为,并将新建或者打开的Excel文档替换成带有恶意宏代码的文档,恶意的宏代码
软件测试实战项目(Web项目)
浏览:88
5星 · 资源好评率100%
内容展示https://blog.csdn.net/weixin_43468923/article/details/112177100,选择性下载,仅供学习交流参考,请勿用作商务用途,若发现用作商用,保留平台申诉和法律维权的权利。
双闭环直流调速系统仿真
浏览:152
双闭环直流调速系统仿真
Windows 10系统连接共享打印机报错0x00000709、0x0000007c、0x0000011b.zip
浏览:40
解决:Windows 10系统连接共享打印机报错0x00000709、0x0000007c、0x0000011b
idapro8.3全架构支持版本(附插件keypatch等)
浏览:107
idapro8.3
S7-1200全系列最新固件V4.6
浏览:135
3星 · 编辑精心推荐
S7-1200全系列最新固件V4.6,里面找相对订货号的固件更新
ISO26262-2018 全套标准
浏览:74
5星 · 资源好评率100%
ISO26262-2018 全套标准,PART1~12
华为RH2288H V3,V100R003C00SPC733更新包
浏览:135
有主板,IBMC,等全部都下了
评论
收藏
内容反馈
立即下载
资源评论
资源反馈
评论星级较低,若资源使用遇到问题可联系上传者,3个工作日内问题未解决可申请退款~
联系上传者
评论
richarming
粉丝: 1
资源:
4
私信
上传资源 快速赚钱
我的内容管理
展开
我的资源
快来上传第一个资源
我的收益
登录查看自己的收益
我的积分
登录查看自己的积分
我的C币
登录后查看C币余额
我的收藏
我的下载
下载帮助
前往需求广场,查看用户热搜
最新资源
神通数据库单机部署安装
C代码:动态规划算法之01背包问题
C语言代码:直接插入排序
sklearn 实现混淆矩阵的计算
消操职考.apk
Unmanned Ground Vehicles (UGVs) Developments
得力D31系列打印机错误代码
ISO-26262中文版,道路车辆功能安全标准
[Abraham_Berman,_Robert_J._Plemmons]_Nonnegative_m(bookzz.org).djvu
Java基础知识面试必备
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功