嵌入式实时操作系统uCOS-II_邵贝贝.pdf
非常经典的介绍ucOS的书籍,
学习ucOS的必读书
libnet 2.0.1
libnet 2.0.1最新版
功能强大的数据包构造,数据包的处理,数据包发送,函数库。
例如我们要构造一个ip数据包,可以使用如下函数:
libnet_ptag_t
libnet_build_ipv4(u_short len, u_char tos, u_short id, u_short frag,
u_char ttl, u_char prot, u_short sum, u_long src, u_long dst,
u_char *payload, u_long payload_s, libnet_t *l, libnet_ptag_t ptag);
不难看出,我们可以定义ip的每一个字段。
FPGA开发全攻略(上).pdf
全面介绍了FPGA各方面的知识,中文版,并且结合实际的开发工具,很实用。
xilinx ise 10.1 使用教程
新手熟悉xilinx ise 10.1 开发环境的入门资料,资料中从 新建工程 以一个实例 ,开始介绍,对于初学者非常实用。
understand for c++ 1.4.410 注册机
understand for c++ 1.4.410 注册机
我自己用过了,可以使用
AES 标准 英文版
AES 标准的英文版
目录如下:
Table of Contents
1. INTRODUCTION............................................................................................................................................. 5
2. DEFINITIONS .................................................................................................................................................. 5
2.1 GLOSSARY OF TERMS AND ACRONYMS ........................................................................................................... 5
2.2 ALGORITHM PARAMETERS, SYMBOLS, AND FUNCTIONS ................................................................................. 6
3. NOTATION AND CONVENTIONS............................................................................................................... 7
3.1 INPUTS AND OUTPUTS ..................................................................................................................................... 7
3.2 BYTES ............................................................................................................................................................. 8
3.3 ARRAYS OF BYTES .......................................................................................................................................... 8
3.4 THE STATE ...................................................................................................................................................... 9
3.5 THE STATE AS AN ARRAY OF COLUMNS ........................................................................................................ 10
4. MATHEMATICAL PRELIMINARIES ....................................................................................................... 10
4.1 ADDITION ...................................................................................................................................................... 10
4.2 MULTIPLICATION .......................................................................................................................................... 10
4.2.1 Multiplication by x .............................................................................................................................. 11
POLYNOMIALS WITH COEFFICIENTS IN GF(28) .............................................................................................. 12
4.3
5. ALGORITHM SPECIFICATION................................................................................................................. 13
5.1 CIPHER .......................................................................................................................................................... 14
5.1.1 SubBytes()Transformation............................................................................................................ 15
5.1.2 ShiftRows() Transformation ........................................................................................................ 17
5.1.3 MixColumns() Transformation...................................................................................................... 17
5.1.4 AddRoundKey() Transformation .................................................................................................. 18
5.2 KEY EXPANSION ........................................................................................................................................... 19
5.3 INVERSE CIPHER............................................................................................................................................ 20
5.3.1 InvShiftRows() Transformation ................................................................................................. 21
5.3.2 InvSubBytes() Transformation ................................................................................................... 22
5.3.3 InvMixColumns() Transformation............................................................................................... 23
5.3.4 Inverse of the AddRoundKey() Transformation............................................................................. 23
5.3.5 Equivalent Inverse Cipher .................................................................................................................. 23
6. IMPLEMENTATION ISSUES ...................................................................................................................... 25
6.1 KEY LENGTH REQUIREMENTS ....................................................................................................................... 25
6.2 KEYING RESTRICTIONS ................................................................................................................................. 26
6.3 PARAMETERIZATION OF KEY LENGTH, BLOCK SIZE, AND ROUND NUMBER ................................................. 26
6.4 IMPLEMENTATION SUGGESTIONS REGARDING VARIOUS PLATFORMS ........................................................... 26
APPENDIX A - KEY EXPANSION EXAMPLES ................................................................................................ 27
A.1 EXPANSION OF A 128-BIT CIPHER KEY .......................................................................................................... 27
A.2 EXPANSION OF A 192-BIT CIPHER KEY .......................................................................................................... 28
A.3 EXPANSION OF A 256-BIT CIPHER KEY .......................................................................................................... 30
APPENDIX B – CIPHER EXAMPLE.................................................................................................................... 33
APPENDIX C – EXAMPLE VECTORS................................................................................................................ 35
C.1 AES-128 (NK=4, NR=10).............................................................................................................................. 35
C.2 AES-192 (NK=6, NR=12).............................................................................................................................. 38
C.3 AES-256 (NK=8, NR=14).............................................................................................................................. 42
APPENDIX D - REFERENCES.............................................................................................................................. 47
Makefile 手册中文版 ver 3.8 .pdf
最详细,最全面的Makefile语法书,全中文版
pdf格式。
翻译整理:徐海兵2004-09-11
另外,喜欢英文版的,我也上传了,可以搜一下,和这个中文版完全对应。
Linux命令大全.chm
相当完整的Linux 资料,包含了Linux绝大多数的命令(一共316个),而且是CHM格式,便于查阅。对于每个命令的使用,包括:功能说明、语法、补充说明、参数解释 四部分。
WTK 英文版-手机软件开发工具
sun公司的手机软件开发平台(英文版),我一直用这个。
Ha_dt4111cn.zip
教你作自己的网页,轻松成为网页高手.内有详细的资料