Numeri primi 1.0.0
Factorization and primality of numbers. With this small software you can factor any number or verify whether a prime number. The interface is very simple and friendly, its use will allow us to throw tables and charts that at school persecute us. It shows ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- USB Data Recovery
- DVD Labels
- SSuite NetSurfer E-Gamer x64
- Privacy Eraser Free
- EasyBilling Invoicing Software
- AnyMP4 Video Editor
- Windows Data Recovery Software
- Aiseesoft AI Photo Editor
- Files Recover Mac
- FoneLab iOS Unlocker
- NTFS Files Recovery Utility
- Undelete NTFS Partition
- Apeaksoft iOS Unlocker for Mac
- Apeaksoft Data Recovery for...
- 4Easysoft iPhone Unlocker...
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Primality Download
-
1Freeware
-
2Hpmbcalc Hex Calculator 4.21
With Hpmbcalc, you can easily perform a lot of big number math and encryption operations, such as: square root, modular inverse; hash, CRC, and check sum make; shift register configuration evaluation and simulationl; pseudo-random number generation; primality test; hex, dec, ...$39.95 -
3Scientific Calculator CX90E 1.0
Primality test, rectangular-polar conversion. Scientific Constants, User's variables... User's Manual in PDF format.$19.00 -
4Frink for Mac OS X 2013-02-19 1.0
TE Advanced mathematical functions including trigonometric functions (even for complex numbers,) factoring and primality testing, and base conversions. TE Unit Conversion between thousands of unit types with a huge built-in data file. TE Date/time ...Freeware -
5Frink 2013-02-19 1.0
TE Advanced mathematical functions including trigonometric functions (even for complex numbers,) factoring and primality testing, and base conversions. TE Unit Conversion between thousands of unit types with a huge built-in data file. TE Date/time ...Freeware -
6Cryptography | Comp. Sc. Engg. 1
Some of topics Covered in this application are: 1) Basics of Cryptography 2) Conventional cryptography 3) Key management and conventional encryption 4) Keys 5) Pretty Good Privacy 6) Digital signatures 7) Digital certificates 8) The OSI Security Architecture 9) Network Security 10) Types of attacks 11) Denial of service attack 12) Smurf Attack 13) Distributed Denial of Service Attacks 14) Security Mechanism 15) A Model for Network Security 16) Symmetric Ciphers 17) Classical SubstitutionTechniques 18) Classical Transposition Techniques 19) Rotor Machines 20) Steganography 21) Block Cipher Principles 22) The Data Encryption Standard 23) Differential Cryptanalysis Attack 24) Cipher and Reverse Cipher 25) Security of DES 26) The Strength of DES 27) Differential and Linear Cryptanalysis 28) Block Cipher Design Principles 29) Finite Fields 30) The Euclidean Algorithm 31) Finite Fields of The Form GF(p) 32) Polynomial Arithmetic 33) Finite Fields Of the Form GF(2n) 34) The AES Cipher 35) Substitute Bytes Transformation 36) Evaluation Criteria For AES 37) ShiftRows Transformation 38) AddRoundKey Transformation 39) AES Key Expansion Algorithm 40) Equivalent Inverse Cipher 41) Multiple Encryption and Triple DES 42) Triple DES with Two Keys 43) Block Cipher Modes of Operation 44) Cipher Feedback Mode 45) Output Feedback Mode 46) Counter Mode 47) Stream Ciphers 48) The RC4 Algorithm 49) Random Number Generation 50) Pseudorandom Number Generators 51) Linear Congruential Generators 52) Cryptographically Generated Random Numbers 53) Blum BlumShub Generator 54) True Random Number Generators 55) Key Hierarchy 56) Key Distribution Centre 57) Transparent Key Control Scheme 58) Controlling Key Usage 59) Confidentiality Using Symmetric Encryption 60) Link versus End-to-End Encryption 61) Key Distribution 62) Traffic Confidentiality 63) Prime Numbers 64) Fermat\\\'s and Euler\\\'s Theorems 65) Testing for Primality 66) The Chinese ...$1.00