Welcome![Sign In][Sign Up]
Location:
Search - Hill

Search list

[Crack HackHill

Description: 我自己写的HILL加密/解密算法~~~~~[绝对原创]
Platform: | Size: 31453 | Author: mrmark | Hits:

[Crack HackHill

Description: Hill加密算法的基本思想是将l个明文字母通过线性变换将它们转换为k个密文字母。脱密只要做一次逆变换就可以了。密钥就是变换矩阵本身。即 M=m1m2……ml Ek(M)=c1c2……cl 其中 c1=k11m1+k12m2+……+k1lml c2=k21m1+k22m2+……+k2lml …… cl=kl1m1+kl2m2+……+kllml 通常对于字母加解密,使用mod 26的方法。 以上线性方程可以采用矩阵表示。
Platform: | Size: 143581 | Author: wildkaede | Hits:

[Crack Hackhill

Description: 对称密码学体制中hill密码加密解密算法实现。
Platform: | Size: 28382 | Author: shine | Hits:

[Other resourceMcGraw-Hill.Osborne.Oracle.Database.10g.SQL.eBook-

Description: McGraw-Hill.Osborne.Oracle.Database.10g.SQL.eBook-LiB
Platform: | Size: 853424 | Author: zhou | Hits:

[Other resourceMcGraw-Hill-SchaumsOutlineofProgrammingwithC++2ndE

Description: McGraw-Hill - Schaums Outline of Programming with C++ 2nd Ed 很著名的教学参考书
Platform: | Size: 3109132 | Author: 黄天安 | Hits:

[Crack Hackhill

Description: HILL PROGRAMMING COURSE DESIGN FOR CRY-COURSE
Platform: | Size: 11523 | Author: jill | Hits:

[Otherhill加密

Description: 自己编写的hill加密程序
Platform: | Size: 474 | Author: paopaomeng | Hits:

[Mathimatics-Numerical algorithms希尔排序

Description: 希尔排序-Sort Hill
Platform: | Size: 1024 | Author: 俞伟 | Hits:

[OracleMcGraw-Hill.Osborne.Oracle.Database.10g.SQL.eBook-

Description: McGraw-Hill.Osborne.Oracle.Database.10g.SQL.eBook-LiB
Platform: | Size: 852992 | Author: zhou | Hits:

[Data structsds_kcsj_cxc

Description: 《数据结构》排序演示系统。实现6种内部排序。包括直接插入排序,希尔排序,冒泡排序,直接选择排序,快速排序,堆排序。。这是我的数据结构课程设计!-"data structure" Sort demonstration system. Six species of achieving internal order. Including direct insertion sort, Hill, in order Bubble Sort, direct selection, in order of Quick Sort, heap sort. . This is my data structure course design!
Platform: | Size: 321536 | Author: 程相闯 | Hits:

[AlgorithmPathFinderRedux

Description: 包括Pheromones Algorythm、Memory Algorythm和Hill Climbing Algorythm I,II,III在内的多个人工智能算法的实现-including Pheromones Algorythm, Memory Algorythm and Hill Climbing Algorythm I, II, III from the number of artificial intelligence algorithms to achieve
Platform: | Size: 117760 | Author: 冯枫 | Hits:

[Data structs内部排序的主要算法及相关可实现程序

Description: 内部排序的所有算法,而且有相关可执行例子,包括插入排序,选择排序,希尔排序,快速排序,堆排序,归并排序等,很全,很孀。-sequencing of all internal algorithm, but is related to the executable examples, including insertion sort, select, in order of ranking Hill, the quick sort, heap sort, merging sequencing, all very, very widow.
Platform: | Size: 13312 | Author: 李雷 | Hits:

[Crack Hack希尔

Description: 不错的希尔代码,希尔是一种经典的加密算法,加密可以通过一线形变换,脱密再做依次逆变换。密钥就是变换矩阵本身。-good code Hill, Hill is a classic encryption algorithms, encryption can transform line shape, followed again from close inverse transform. Key is the transformation matrix itself.
Platform: | Size: 2048 | Author: 李军 | Hits:

[Fractal program10_01

Description: 分形算法C++ 程序:随机中点位移法生成山源代码-fractal algorithm C : random midpoint displacement method source code generated Hill
Platform: | Size: 22528 | Author: 齐松 | Hits:

[OtherC语言:陷阱和缺陷

Description: C语言:陷阱和缺陷 PDF格式 原著:Andrew Koenig - AT&T Bell Laboratories Murray Hill, New Jersey 07094 C语言及其典型实现被设计为能被专家们容易地使用。这门语言简洁并附有表达力。但有一些限制可以保护那些浮躁的人。一个浮躁的人可以从这些条款中获得一些帮助。-C Language : pitfalls and shortcomings in PDF format works : Andrew Koenig-ATT Bell Laboratories Murray Hill, New Jersey 07094 C language and its typical realization was designed to be easy for the experts to use. This language accompanied by a concise expression of power. But there are some restrictions to protect those impetuous person. An impetuous people can access these articles help.
Platform: | Size: 264192 | Author: 李白 | Hits:

[Crack HackHillCodor

Description: 在VC环境下采用希尔密码体制加密、解密和破译。该软件实现了输入任意长度的密钥对文件进行加密和解密,解密密钥和密文保存在文件中。如果有完整的明文和对应的密文可是实现破译功能,即得出加密密钥。-in VC environment with Hill cryptosystem encryption, decryption and decoding. The software arbitrary length of the input to the key document encryption and decryption, and the decryption key secret to preserve the text in the document. If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.
Platform: | Size: 4512768 | Author: | Hits:

[Data structs排序算法-java

Description: 用java实现的数据结构排序算法,包括:选择排序、插入排序、冒泡排序、希尔排序、快速排序、堆排序、归并排序。-used to achieve the ranking algorithm data structure, including : Select, in order of insertion sequence and Bubble Sort, Hill sequencing, rapid sequencing, heap sort, merging sequencing.
Platform: | Size: 54272 | Author: 陈为 | Hits:

[CSharphsdfhjshdj

Description: 对深度优先(Depth first) 、宽度优先(Breath first) 、爬山法(Hill Climbing) 、 最佳优先(Best first) 以及A*搜索算法进行分析比较,要求: 给出这几种算法的描述; 根据SearchDemonstration程序中给出的示例,给出各算法的执行过程-priority right depth (Depth first), the width of priority (Breath first), mountaineering (Hill Climbing), the best priority (Best first) and the A* search algorithm analysis, requirements : This is the description of several algorithms; According SearchDemonstration procedures given in the examples are given of the algorithm implementation process
Platform: | Size: 1748992 | Author: yao | Hits:

[OS programhighsasptoolbox

Description: All M-files are copyrighted, 2000, by Dimitris G. Manolakis, Vinay K. Ingle, and Stephen M. Kogon for use with the book "Statistical and Adaptive Signal Processing" published by McGraw-Hill Higher Education, Co. -All M-files are copyrighted, 2000, by Dimitris G. Manolakis, Vinay K. Ingle, and Stephen M. Kogon for use with the book "Stati stical and Adaptive Signal Processing "publis hed by McGraw-Hill Higher Education, Co.
Platform: | Size: 34816 | Author: redradar | Hits:

[OtherMcGraw.Hill.VHDL.Programming.by.Example.4th.Ed

Description: 号称是最 经典的VHDL编程教材,虽然是英文版的,但写得非常通俗易懂。本人就是从这本书开始学习VHDL的。-which is the most classic material VHDL programming, is the English version. it is very user-friendly. I was this book started learning VHDL.
Platform: | Size: 1979392 | Author: 黄鹤 | Hits:
« 1 23 4 5 6 7 8 9 10 ... 50 »

CodeBus www.codebus.net