word文件,79页,U8 cloud领域解决方案-协同供应链篇,精品一级
2021-06-06 11:01:45 5.76MB 智慧供应链 供应链
压缩感知重构算法:SP、OMP、SAMP以及cosamp;这些算法能够精确地重构一维信号,可以用于语音信号、生理信号如脉搏信号的压缩重构
2021-06-05 20:17:35 4KB CS,cosamp
1
美国国家标准与技术研究院关于随机数生成及测试的标准
2021-06-04 19:00:14 1019KB 信息安全 随机数 NIST标准
1
The Technical Specification for the Security Content Automation Protocol (SCAP)
2021-06-04 19:00:14 540KB 信息安全 SCAP NIST
1
Guideline for Using Cryptographic Standards in the Federa asymmetric-key algorithm; identity authentication; confidentiality; digital signatures; encryption; integrity; key establishment; message authentication; random bit generation; symmetric-key algorithm
2021-06-04 19:00:13 1.32MB 信息安全 cryptography
1
Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic key. This Recommendation discusses the generation of the keys to be managed and used by the approved cryptographic algorithms.
2021-06-04 19:00:13 531KB 信息安全 密钥生成
1
This Recommendation provides cryptographic key-management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material, including definitions of the security services that may be provided when using cryptography and the algorithms and key types that may be employed, specifications of the protection that each type of key and other cryptographic information requires and methods for providing this protection, discussions about the functions involved in key management, and discussions about a variety of key-management issues to be addressed when using cryptography. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Part 3 provides guidance when using the cryptographic features of current systems.
2021-06-04 19:00:13 1.61MB 信息安全
1
This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key-establishment scheme defined in NIST Special Publications 800-56A or 800-56B.
2021-06-04 19:00:12 677KB 信息安全
1
This Recommendation specifies four types of SHA-3-derived functions: cSHAKE, KMAC, TupleHash, and ParallelHash, each defined for a 128- and 256-bit security strength. cSHAKE is a customizable variant of the SHAKE function, as defined in Federal Information Processing Standard (FIPS) 202. KMAC (for KECCAK Message Authentication Code) is a variable-length message authentication code algorithm based on KECCAK; it can also be used as a pseudorandom function. TupleHash is a variable-length hash function designed to hash tuples of input strings without trivial collisions. ParallelHash is a variable-length hash function that can hash very long messages in parallel.
2021-06-04 19:00:12 490KB 信息安全
1
MTK6833 5G 下载工具
2021-06-03 14:00:44 59.45MB MTK6833 5g 单串口下载工具
1