点击切换搜索课件文库搜索结果(330)
文档格式:DOC 文档大小:541.5KB 文档页数:3
7-1题7-1图(a)所示圆截面杆,两端承受一对方向相反、力 偶矩矢沿轴线且大小均为M的力偶作用。试问:在杆件的任一横
文档格式:DOC 文档大小:8.97MB 文档页数:9
913如题9-13图所示,圆轴AB与套管CD用刚性突缘E焊 接成一体,并在截面A承受扭力偶矩M作用,圆轴的直径d=56m mm,许用切应力[r]=80MPa,套管的外径D=80mm,壁厚b=6 mm,许用切应力[r2]=40MPa
文档格式:PPT 文档大小:3.24MB 文档页数:112
醇和醚都是烃的含氧衍生物。它们可看成是水分子 中的氢原子被烃基取代的化合物。 H—O—H R—OH R—O—R’ 水 醇 醚 硫和氧同属于周期表中第VI A族,因此,有机含硫化 合物与有机含氧化合物有一些相似的性质
文档格式:PPT 文档大小:411KB 文档页数:82
Additional key-sizes and block-sizes Ability to function efficiently and securely in a wide variety of platforms and applications low-end smartcards, wireless: small memory requirements IPSec, ATM – small key setup time in hardware B-ISDN, satellite communication – large encryption speed Flexibility
文档格式:PPT 文档大小:424KB 文档页数:60
Originally designed to be efficient in hardware . A LOT of money has been invested in hardware. although DES standard is public there was considerable controversy over design – in choice of 56-bit key (vs Lucifer 128-bit) – and because design criteria were classified
文档格式:PPT 文档大小:405KB 文档页数:63
Iterating Block ciphers Definition A product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the individual components. Definition An iterated block cipher is a block cipher involving the sequential repetition of an internal function called a round function. Parameters include the number of rounds Nr, the block bitsize n, and the bitsize k of the input key K from which Nr subkeys Ki (round keys) are derived. For invertibility (allowing unique decryption), for each value Ki the round function is a bijection on the round input
文档格式:PPT 文档大小:159.5KB 文档页数:56
Definitions – Digital Signature - a data string which associates a message with some originating entity – Digital Signature Generation Algorithm – a method for producing a digital signature – Digital signature verification algorithm - a method for verifying that a digital signature is authentic (i.e., was indeed created by the specified entity)
文档格式:PPT 文档大小:278KB 文档页数:56
Security Attack: Any action that compromises the security of information. Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms
文档格式:PDF 文档大小:142.85KB 文档页数:2
当前的UML(统一建模语言)标准的推出为建模提供了基本的支持,是一种定义良好、功能强大且普遍适用的可视化建模语言。本文是在对UML建模的研究基础上,介绍了在商业活动中如何使用UML模型进行建模
文档格式:PPTX 文档大小:2.29MB 文档页数:86
第一部分 学籍及管理工作规定 第二部分 培养工作规定 第三部分 学位工作 第四部分 招生工作规定 第五部分 奖助学金及“三助”体系 第六部分 增强安全意识
首页上页2021222324252627下页末页
热门关键字
搜索一下,找到相关课件或文库资源 330 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有