1.
Cryptanalysis of the Reduced HASH Functions SHA-256 and SHA-512;
对缩短步数的HASH函数算法SHA-256、SHA-512的分析
2.
The design and implementation of the multiplexing SHA-224/256 IP cores
SHA-224/256复用IP核的设计与实现
3.
FIPS ZZ40-ZZ compliant triple DES encryption and SHA-ZZ MAC
与FIPS ZZ40-ZZ兼容的三重DES加密和SHA-ZZ MAC
4.
HMAC/SHA-1 IP Design Based on TPM Specification;
基于TPM规范的HMAC/SHA-1 IP设计
5.
Questions Management System Based on SHA-1 Safety Certification
基于SHA-1安全认证的题库管理系统
6.
Hardware implementation of SHA-1 suiting to the wireless sensor network node chip
适用于WSN节点芯片的SHA-1硬件实现
7.
HDL Design and Simulation of SHA-1 Algorithm
SHA-1算法的HDL设计与仿真
8.
An improved OPA steganography Algorithm Based on SHA-1
基于SHA-1实现的OPA密写算法
9.
Design and Analysis of Modified SHA-x Hash Algorithm
一类SHA-x改进杂凑算法的设计及分析
10.
Triple DES encryption with a ZZ68-bit key and a SHA-ZZ MAC
三重 DES 加密,使用一个 ZZ68 位密钥和一个SHA-ZZ MAC
11.
Statistical Analysis of One-way Hash Function SHA-1 and its Algorithm Improvement
单向Hash函数SHA-1的统计分析与算法改进
12.
Application of SHA-1 Algorithm in the Design of Prepaid Intelligent Water Meter
SHA-1算法在TM卡预付费智能水表设计中的实现
13.
Design on Layout Rearrangement of Enterprise Logistics Based on the Combination of SLP and SHA
基于SLP和SHA结合的企业物流系统平面再布置设计
14.
Research of digital signature based on SHA-1 and RSA in official document transmission
公文传输过程中基于SHA-1和RSA的数字签名方案研究
15.
Modeling the National Health Expenditures in China Based upon SHA: An Artificial Neural Network Approach
我国卫生总费用推算研究:基于SHA体系和人工神经网络方法
16.
Indefinite Equation z~2+2(2xy)~2=(x~2-y~2+2xy)~2
关于不定方程z~2+2(2xy)~2=(x~2-y~2+2xy)~2
17.
For example:A a = X x + Y y - 2/2 + Zz;
例如:A=X+Y-2/2+Z;
18.
The inverse of 2 is 1/2.
2的倒数是1/2.