Cyberpunks Role In Cryptography
DFT plays important role in DSP and used in wide variety of applications like correlation and spectral analysis. Understanding quantization errors in its computation is an important aspect of its design either for s/w or h/w implementation.A complex DFT of N points has N complex (4N real)...
Platforms: Matlab
License: Freeware | Size: 10 KB | Download (47): A 32 point FFT in embedded MATLAB using fixed point arithmetic Download |
Users can insert [restrict:roles=] and [/restrict] tags into their text, and anything in-between these will only be visible to users who are a member of a role in the comma-separated list. The module is not capable of supporting role separation by ", " (comma and space).InstallationUnpack in your...
Platforms: Windows, Mac, *nix, PHP, BSD Solaris
License: Freeware | Download (54): Restricted Text Download |
X-Moto is a challenging 2D motocross platform game, where physics play an all important role in the gameplay. You need to control your bike to its limit, if you want to have a chance finishing the more difficult of the challenges. First youll try just to complete the levels, while later youll...
Platforms: *nix
License: Freeware | Size: 2.6 MB | Download (236): X-Moto Download |
The role in game which you will play is that of John Morris or Eric Lecarde, both of whom are on a mission to slay Dracula and send him back to his gravesite.The game is six levels long and starts in Castle Dracula in Romania and takes you across many famous European settings like the Leaning...
Platforms: Windows
License: Freeware | Size: 1.23 MB | Download (48): Castlevania - The New Generation Download |
Custom-TF is a multiplayer Quake modification, allowing players to customize their role in the game to be whatever they want.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 608.65 KB | Download (44): The Custom-TF Improvement Project Download |
Being that Sun's Java Cryptography Extension (JCE) is not well-documented and has a steep learning curve, the vH Crypto API for Java is being created to abstract the procedures which are commonly used in cryptography.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 8.12 KB | Download (49): vH Crypto API for Java Download |
FUNCTIONotr = transform(itr,tmx)PARAMETERSotr = output tensor, after transformation; has the same dimensions as the input tensoritr = input tensor, before transformation; should be a 3-element vector, a 3x3 matrix, or a 3x3x3x... multidimensional array, each dimension containing 3 elementstmx =...
Platforms: Matlab
License: Freeware | Size: 10 KB | Download (45): Transform Tensor Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 18.29 MB | Download (39): KeyMingler Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 12.35 MB | Download (34): gurbas Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 5.32 MB | Download (38): nulis Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 5.16 MB | Download (38): Vakar Download |
Help a Bennet sister find a husband as you take a starring role in Jane Austen???*a*?s most popular novels in Matches & Matrimony! Will you pursue Mr. Bingley, whose good nature has already endeared him to your sister, or perhaps Mr. Darcy, the famous protagonist from Pride and Prejudice? The...
Platforms: Mac
License: Freeware | Size: 65.03 MB | Download (37): Matches and Matrimony: A Pride and Prejudice Tale Download |
This module allows users to set the ownership of a node to a role with full access (view, update, delete). By default the permission will be set to the role of the user. In case the user has more than one role, there will be a list of roles to choose from. You can also add permission to user that...
Platforms: PHP
License: Freeware | Size: 10 KB | Download (47): Role Ownership Download |
The Blowfish cipher in C and i386 assembler. In cryptography, Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products. While no effective cryptanalysis of Blowfish has been found to date, more...
Platforms: *nix
License: Freeware | Size: 12.29 KB | Download (180): The Blowfish Download |
MB Travel Astrology finds your travel profile based on your sun sign in Western Astrology. This shows more about your travel preferences and the kind of travel adventures you would like to go out on. 'Travel Astrology' can help you understand your travel preferences depending on your zodiac sign....
Platforms: Windows
License: Freeware | Size: 1.55 MB | Download (66): MB Travel Astrology Download |
An OS X programming environment for composers, sound artists, VJs and graphic artists with an interest in live or interactive programming. Impromptu is a Scheme language environment, a member of the Lisp family of languages.
Time plays a major role in the Impromptu environment allowing accurate...
Platforms: Mac
License: Freeware | Size: 10 MB | Download (567): impromptu for Mac OS Download |
In this screensaver, you will see rustic scenery of crouching cow mountain. Just down the mountain is the biggest production base for pig leather in China. It looks tranquil inside the town, but it is the place where multi-billion dollars worth of business is done every year. The supply and...
Platforms: Windows
License: Freeware | Size: 948 KB | Download (56): Crouching cow mountain screensaver Download |
MB Western Astrology Planetary Dignities shows the rulership of the planets in the signs they are present in based on Western Astrology. Each planet may or may not be compatible with the sign it is present in. The placements effects the expression of the characteristics reflected by the planet....
Platforms: Windows
License: Freeware | Size: 1.3 MB | Download (539): MB Western Astrology Planetary Dignities Download |
MB Western Astrology Planets And Houses shows the positions of the planets in the twelve houses in your natal chart based on Western Astrology. The distribution of the planets in the different houses play an important role in interpreting the birth chart of an individual. MB Western Astrology...
Platforms: Windows
License: Freeware | Size: 1.62 MB | Download (534): MB Western Astrology Planets And Houses Download |
The Blowfish cipher in C and i386 assembler. In cryptography, Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products. While no effective cryptanalysis of Blowfish has been found to date, more...
Platforms: *nix
License: Freeware | Size: 10.24 KB | Download (40): The Blowfish cipher Download |