搜索资源列表
11-02-0282-02-000i-alternate-temporal-key-hash.ra
- temporal key hash documentation-temporal key hash documentationss
music
- 运用STC单片机实现凑乐 “祝你生日快乐” 程序主要由 音阶和音乐 两部分组成-STC MCU using hash Music " Happy Birthday to You" program mainly by the scales and music composed of two parts
rfc5106.txt
- This document specifies EAP-IKEv2, an Extensible Authentication Protocol (EAP) method that is based on the Internet Key Exchange (IKEv2) protocol. EAP-IKEv2 provides mutual authentication and session key establishment between an EAP peer and an
SHA
- 3种安全HASH算法的实现(SHA-1,SHA-256,SHA-512),并对3中算法的性能进行了测试-Achieve 3 kinds of SHA algorithm (SHA-1, SHA-256, SHA-512) and test the performance of them
SHAL_KEIL
- 通过单片机实现哈希函数SHA-1,C源程序完全可用,已经测试,外部加密芯片采用DS28E01-1-MCU hash function SHA-1, C source code fully available, and has been tested external encryption chip uses DS28E01-100
SHA204_90USB1287
- ATSHA204 主要特性: 1,SHA-256 Hash算法 2,有保证的唯一的72-bit序列号; DS28CN01 64-bit 不仅有软件加密,内部还有高质量硬件加密。 3,16个槽口的4kbits EEPROM: 4Kbits / 8 = 512Bytes 每个槽口32bytes 4,I2C接口, 单线接口 5, 和Atmel AT88SA102S,AT88SA10HS 6, i2c 地址默认为0xc8; 还可以configuration zon
hash-use-list
- 哈希算法是怎么实现的,我们来重温下学校时代就学过的哈希算法吧。-Hash algorithm is how to achieve, we come to the school of the school under the age of the hash algorithm.
3-STM32F103C8T6 CAN总线演示程序
- CAN 列火车那个阿斯顿金沙酒店hash打开(Aston and the charge was a weak weak weak if the company is)