▍1. boulder-master
An ACME-based CA, written in Go.
ATMEL安全芯片,加密芯片,使用说明文档(ATMEL enc chip use able)
STEGNOGRAPHYIn digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it.
包含了产生逻辑斯蒂映射的代码,以及绘制了逻辑斯蒂映射的分岔图以及李雅普诺夫指数的图像,还有程序运行结果的图像.李雅普诺夫指数在研究动力系统的分岔、混沌运动特征中起着重要的作用,,李雅普诺夫指数大于0,处于混沌状态. (The logistic map contains the code, and draw the image bifurcation diagram of logistic map and Lyapunov exponent, image and program results. The Lyapunov exponent in the study of power system bifurcation and chaotic motion characteristics plays an important role, the Lee Yap Andrianof index is greater than 0, is in a chaotic state.)
EtherCAT基础技术介绍,讲的比较易懂。。。(EtherCAT basis of technical presentations, talking about relatively straightforward. . .)
实验名称:关于数组下标越界的异常操作。 实验要求:自定义String类,当数组下标越界调用异常处理。 初步认识:通过C++的异常处理建立在三个关键字try 、catch和throw实现。(Laboratory name: about array subscript bounds of abnormal operation. Experimental requirements: custom String class, when the array subscript transitions exception handling. Preliminary understanding: by c++ exception handling is based on three key words the try and catch and throw.)
说明: 实现国密算法的SM2、SM3、SM4,可以界面上测试算法的正确性,同时包含国密局公开的国密算法规范,这是信息安全的基本软件。(Encryption algorithm to achieve the country s SM2, SM3, SM4, you can test the correctness of the algorithm interface and also includes the country close to the national Bureau of Public encryption algorithm specification, which is the basic information security software.)
实现国密算法的SM2、SM3、SM4,可以界面上测试算法的正确性,同时包含国密局公开的国密算法规范,这是信息安全的基本软件。(Encryption algorithm to achieve the country s SM2, SM3, SM4, you can test the correctness of the algorithm interface and also includes the country close to the national Bureau of Public encryption algorithm specification, which is the basic information security software.)
说明: sh-1的加密解密算法的实现,有相关文件和代码(sh-1 encryption and decryption algorithm, related documents and code)
sh-1的加密解密算法的实现,有相关文件和代码(sh-1 encryption and decryption algorithm, related documents and code)
国密接口的实现和测试案列 对程序开发员有很好的参考价值(SM2 interface function implement and test sample,valuable to program developer)
运用典型的ssh2框架,具有上传文件,加解密,数字签名和身份认证等功能(Use ssh2 typical framework, with the uploaded file encryption and decryption, digital signature and authentication functions)
this is a program implemented AES algorithm to encrypt the information sent and it will decrypt the data.