在线咨询
eetop公众号 创芯大讲堂 创芯人才网
切换到宽版

EETOP 创芯网论坛 (原名:电子顶级开发网)

手机号码,快捷登录

手机号码,快捷登录

找回密码

  登录   注册  

快捷导航
搜帖子
芯片精品文章合集(500篇!) 创芯人才网--重磅上线啦!
查看: 4542|回复: 27

华为编程规范

[复制链接]
发表于 2009-8-30 11:44:18 | 显示全部楼层 |阅读模式

马上注册,结交更多好友,享用更多功能,让你轻松玩转社区。

您需要 登录 才可以下载或查看,没有账号?注册

x
华为编程规范

华为编程规范.rar

156.31 KB, 下载次数: 62 , 下载积分: 资产 -2 信元, 下载支出 2 信元

 楼主| 发表于 2009-8-30 11:45:36 | 显示全部楼层

确实不错!!

自己顶一个
发表于 2009-8-30 12:45:22 | 显示全部楼层
支持楼主。
发表于 2009-8-30 17:41:16 | 显示全部楼层
学习,顶
发表于 2009-8-31 10:45:51 | 显示全部楼层
支持楼主。
发表于 2009-8-31 11:08:46 | 显示全部楼层
谢谢楼主了
发表于 2009-8-31 14:08:42 | 显示全部楼层
谢谢楼主了
发表于 2009-8-31 19:26:19 | 显示全部楼层
这是好东西,进不进是回事,但是还是要看的,
发表于 2009-9-2 10:50:15 | 显示全部楼层
Multi2 encryption algorithm questionsFrom: malexgreen (malexgreen_at_hotmail.com)
Date: 07/02/03
Date: 2 Jul 2003 09:10:47 -0700Hi:
I have a couple of questions regarding the MULTI-2 encryption
algorithm:
Based on the ISO standard, the encryption algorithm is described as
working using four individual stages, each of which does
arithmetic/logical operations on the plaintext and datakey [size=1em]64 bits at
a time, with the data key taking the system key ([size=1em]32 bits at a time) to
encrypt the datakey into a working key. Here are my questions:
For the plaintext [size=1em]encryption data path, does the output of pi-1
directly feed into the input of pi-2, and so on and so forth.
Also for the key schedule datapath, does the most significant 4-byte
section of the system key go into pi-2, following by the two next most
significant 4-byte chunks into pi-3, etc, etc. or is it the other way
around? Thanks.
Relevant Pages
  • How good an encryption algorithm is this?
    ... Must be capable of encrypting strings to a byte array, ... back again to the same string ... Encryption algorithm must also return the exact number of bytes of the ...
    (microsoft.public.dotnet.languages.csharp)
  • How good an encryption algorithm is this?
    ... Must be capable of encrypting strings to a byte array, ... back again to the same string ... Encryption algorithm must also return the exact number of bytes of the ...
    (microsoft.public.vc.language)
  • Re: Unix Password Encryption Procedures
    ... I know that most Unix machines either use the DES encryption algorithm ... such thing as the "MD5 encryption algorithm". ... Some administrators have also been known to setup systems to authenticate ...
    (comp.unix.admin)
  • Re: how to send data using crypto keys?
    ... The ONLY unbreakable encryption algorithm is One Time Pads. ... EVERY algorithm that re-uses keys or computes new keys in a ...
    (comp.security.misc)
  • Re: UsernameToken Encryption with TripleDES
    ... EncryptionMethod passed in the request. ... > The default encryption algorithm for UsernameToken, ... > at [size=1em]server side by config or programmatically. ...
    (microsoft.public.dotnet.framework.webservices.enhancements)


We are proud to have Web Hosting and Rack Housing from 9 Net Avenue Deutschland.
(16)




                               
登录/注册后可看大图
www.derkeiler.com  > Newsgroups  > sci.crypt  > 2003-07      


                               
登录/注册后可看大图





                               
登录/注册后可看大图
发表于 2009-9-2 23:24:11 | 显示全部楼层
谢谢分享!!
您需要登录后才可以回帖 登录 | 注册

本版积分规则

关闭

站长推荐 上一条 /2 下一条


小黑屋| 手机版| 关于我们| 联系我们| 在线咨询| 隐私声明| EETOP 创芯网
( 京ICP备:10050787号 京公网安备:11010502037710 )

GMT+8, 2024-11-23 09:58 , Processed in 0.046930 second(s), 13 queries , Gzip On, Redis On.

eetop公众号 创芯大讲堂 创芯人才网
快速回复 返回顶部 返回列表