点击切换搜索课件文库搜索结果(399)
文档格式:PDF 文档大小:1.62MB 文档页数:62
《遗传学》课程教学资源(学科前沿)蕴藏在基因组中的生命密码 nature initial sequencing and analysis of the human genome
文档格式:PDF 文档大小:4.47MB 文档页数:18
《遗传学》课程教学资源(学科前沿)蕴藏在基因组中的生命密码 Nature ENCODE pilot project
文档格式:PDF 文档大小:3.4MB 文档页数:50
《遗传学》课程教学资源(学科前沿)蕴藏在基因组中的生命密码 2001 science the sequence of human genome
文档格式:PDF 文档大小:2.77MB 文档页数:158
4. 1 遗传密码——三联子 4. 2 tRNA 4. 3 核糖体 4. 4 蛋白质合成的生物学机制 4. 5 蛋白质运转机制
文档格式:PPT 文档大小:279KB 文档页数:35
You are the CEO of Coca-Cola. You are responsible for bringing a refreshing taste to zillions of people all over the world, but want to keep the recipe secret from Pepsi’s industrial spies
文档格式:PPT 文档大小:1.92MB 文档页数:68
Public-Key Applications can classify uses into 3 categories: – encryption/decryption (provide secrecy) – digital signatures (provide authentication) – key exchange (of session keys)
文档格式:PPT 文档大小:278KB 文档页数:56
Security Attack: Any action that compromises the security of information. Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms
文档格式:PPT 文档大小:51KB 文档页数:22
Numbers Integers Real Arithmetic Operations Addition and subtraction Multiplication and division Exponentiation and logarithm
文档格式:PPT 文档大小:159.5KB 文档页数:56
Definitions – Digital Signature - a data string which associates a message with some originating entity – Digital Signature Generation Algorithm – a method for producing a digital signature – Digital signature verification algorithm - a method for verifying that a digital signature is authentic (i.e., was indeed created by the specified entity)
文档格式:PPT 文档大小:405KB 文档页数:63
Iterating Block ciphers Definition A product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the individual components. Definition An iterated block cipher is a block cipher involving the sequential repetition of an internal function called a round function. Parameters include the number of rounds Nr, the block bitsize n, and the bitsize k of the input key K from which Nr subkeys Ki (round keys) are derived. For invertibility (allowing unique decryption), for each value Ki the round function is a bijection on the round input
首页上页2829303132333435下页末页
热门关键字
搜索一下,找到相关课件或文库资源 399 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有