| 查看: 211 | 回复: 0 | |||
| 当前主题已经存档。 | |||
zsglly木虫 (著名写手)
|
[交流]
【好些英文资料,快下吧】EDA & Electronics Related E-Book links
|
||
|
http://www.comms.scitech.susx.ac.uk/fft/ Computer Programming Art of Assembly language [pdf,tgz] Art of Assembly language (High Level Assembler) [pdf] Thinking in C++, 2nd Edition, Volume 2 [online(frames,no frames)] Thinking in C++, 2nd Edition, Volume 2, Example Codes [online,tgz] C++ Programming style [txt] Multithreaded Programming Guide (Sun Microsystems) [pdf] POSIX.1c/D10 Summary (Sun Microsystems) [ps,pdf] pthreads and Solaris threads: A comparison of two user level threads APIs (Sun Microsystems) [ps,pdf] Thinking in Java, 2nd Edition [online(frames,no frames)] Thinking in Java, 2nd Edition, Example Codes [online,tgz] Intel Architecture optimizations [pdf] HTML 4.0 Reference [online] Data Display Debugger (DDD) 3.3.1 Manual [online] Writing Multithreaded Code in Solaris [pdf] Intel Architecture Optimization Manual [pdf] Intel Architecture Software Developer's Manual, Volume 1, Basic Architecture [pdf] Intel Architecture Software Developer's Manual, Volume 2, Instruction Set Reference [pdf] Intel Architecture Software Developer's Manual, Volume 3, System Programming [pdf] Performance of Various Computers Using Standard Linear Equations Software [pdf] The SPARC Architecture Manual, Version 8 [pdf] The SPARC Architecture Manual, Version 9 [pdf] UltraSPARC I-II User's Manual [pdf] UltraSPARC IIi User's Manual [pdf] microSPARC IIep User's Manual [pdf] SuperSPARC II Addendum [pdf] Alpha Architecture Handbook, Version 4 [pdf] System V Application Binary Interface, Edition 4.1 [pdf] System V Application Binary Interface, Intel386 Architecture Processor Supplement, Edition 4 [pdf] MIPS R4000 Microprocessor User's Manual, 2nd Edition [pdf] The 32-bit PA-RISC Run-time Architecture Document, HP-UX 10.20, Version 3 [pdf] The 32-bit PA-RISC Run-time Architecture Document, HP-UX 11.00, Version 1 [pdf] ANSI/ISO C++ Professional Programmer's Handbook [pdf] VHDL VHDL CookBook by Peter J. Ashenden [pdf] Analog and Mixed-Signal Modeling using VHDL-AMS [pdf] European Space Agency (ESA) VHDL Modelling Guidelines [pdf] US Navy VHDL Modelling Guide [pdf(1,2,3,4,5,6,7)] Operating systems Introduction to OS [pdf] Process scheduling [pdf] Resource management and deadlocks [pdf] I/O Management [pdf] Filesystem [pdf] Memory management [pdf] Interprocess communication [pdf] System security [pdf] Cryptography A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)] Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)] Cryptography - The myths [pdf] A Cryptograpgic Compendium [link] Frequently Asked Questions about Today's Cryptography by RSA Laboratories [pdf] Security protocols overview by RSA Laboratories [pdf] Security Pitfalls in Cryptography [pdf] Stream ciphers [pdf] Understanding Public Key Infrastructure [pdf] Trust Models and Management in Public-Key Infrastuctured [pdf] Why Cryptography is Harder than it looks [pdf] Cryptanalytic Attacks on Pseudorandom Number Generators [pdf] CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)] RSA Laboratories' Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)] Smartcard security [pdf] Digital Signatures, Certificates and Electronic Commerce [pdf] Key recovery - Meeting the Needs of Users or Key Escrow in Disguise [pdf] Implementation Experience with AES Candidate Algorithms [pdf] Performance Analysis of AES candidates on the 6805 CPU core [pdf] UK Government Organisations Involved in Communications and Information Systems Security [pdf] The block cipher Square [pdf] Attacks on Cryptoprocessor Transaction Sets [pdf] Initial Cryptanalysis of the RSA SecurID Algorithm [pdf] Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [pdf] Preliminary Cryptanalysis of Reduced-Round Serpent [pdf] Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML [pdf] Compliance Defects in Public-Key Cryptography [pdf] Architectural considerations for cryptanalytic hardware [pdf] WEP Fix using RC4 Fast Packet Keying [pdf] RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 [pdf] Block Ciphers [pdf] Stream Ciphers [pdf] C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society [pdf] Universal Hashing and Multiple Authentication [pdf] Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf] The simple ideal cipher system [pdf] An FPGA Implementation of the Linear Cruptanalysis [pdf] The math behind the RSA cipher [txt] RSA hardware implementation [pdf] High-Speed RSA implementation [pdf] Are 'Strong' Primes Needed for RSA? [pdf] RSAES-OAEP Encryption scheme [pdf] Has the RSA algorithm been compromised as a result of Bernstein's Papar? [pdf] Are 'Strong' Primed Needed for RSA? [pdf] Why Textbook ElGamal and RSA Encryption are Insecure [pdf] The DES algorithm [txt] The RC5 encryption algorithm [pdf] On The Security of the RC5 Encryption Algorithm [pdf] The ESP RC5-CBC Transform [txt] The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt] The RC6 block cipher [pdf] RC6 as the AES [pdf] The security of RC6 block cipher [pdf] Statistical testing of RC6 block cipher [pdf] Blowfish algorithm in plain English [txt] Source code for Blowfish implementation [zip(C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal)] Twofish: A 128-bit Block Cipher [pdf] Upper bounds on differential characteristics in Twofish [pdf] Impossible differentials in Twofish [pdf] A Twofish retreat: Related-Key attacks against Reduced-Round Twofish [pdf] Further observations on the Key Schedule of Twofish [pdf] Empirical verification of Twofish key uniqueness properties [pdf] Key separation in Twofish [pdf] Improved Twofish implementations [pdf] Implementation of the Twofish Cipher using FPGA devices [pdf] Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)] The Rijndael Block Cipher [pdf] A Specification of Rijndael, the AES Algorithm [pdf] Efficient Implementation of the Rijndael S-box [pdf] The Elliptic Curve Cryptosystem [pdf] Elliptic Curce Cryptosystems [pdf] Elliptic Curve Cryptography, Future Resiliency and High Security Systems [pdf] The Elliptic Curve Cryptosystem for Smart Cards [pdf] The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf] Recommendation on Elliptic Curve Cryptosystems [pdf] Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf] Security Program Stack vulnerability [txt] Non-executable Program Stack vulnerability [txt] Strange Attractors and TCP/IP Sequence Number Analysis [link] Rainbow book series [link] Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge [pdf] Attacks on and Countermeasures for USB Hardware Token Devices [pdf] UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes [pdf] Countermeasures against Buffer Overflow Attacks [pdf] Integrating Flexible Support for Security Policies into the Linux Operating System [pdf] Flaw in NTRU Signature Scheme (NSS) [pdf] Meeting Critical Security Objectived with Security-Enhanced Linux [pdf] Secure Programming with Linux and Unix [pdf] Reverse Compilation Techniques [pdf] What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory [pdf] Stack Smashing Vulnerabilities in the UNIX Operation System [pdf] Networking Networking concepts [pdf] Introduction to Internet Protocols [txt] Network planning and design [pdf] Queuing analysis [pdf] Parallel FTP performance in a High-Bandwidth High-Latency WAN [pdf] Compete WAP Security [pdf] Cryptographic Authentication fo Real-Time Network Protocols [pdf] Temporary Committee on the ECHELON Interception System Report (Working Document) [pdf] IP Multicast Configuration [pdf] Can Shortest-path Routing and TCP Maximize Utility [pdf] A new TCP congestion control with empty queues and scalable stability [pdf] FAST Kernel: Backgroung Theory and Experimental Results [pdf] Robustness and the Internet: Design and evolution [pdf] Robust congestion control for the Internet [pdf] A Mathematical Framework for Designing a Low-Loss, Low-Delay Internet [pdf] On the stability of networks operating TCP-like congestion control [pdf] Ultrascale Network Protocols for Computing and Science in the 21st Century [pdf] Computer Clusters High Performance Computing and Beowulf Clusters [pdf] Web Search for a Planet: The Google Cluster Architecture [pdf] Bluetooth Specification of the Bluetooth System v1.1 22-02-2001 (Core) [pdf] Specification of the Bluetooth System v1.1 22-02-2001 (Profiles) [pdf] SyncML Over Bluetooth [pdf] Bluetooth Network Encapsulation Protocol (BNEP) Specification [pdf] Bluetooth Extended Service Deiscovery Profile (ESDP) for Universal Plug and Play (UPnP) [pdf] Personal Area Networking (PAN) Profile [pdf] Bluetooth Security White Paper [pdf] Security Comparison: Bluetooth vs 802.11 [pdf] Mathematics SOS Mathematics [link] Mathematics archives [link] Dave's math tables [link] On-line Encyclopedia of Integer Sequences [link] Notes on Fermat's Last Theorem by A. J. Van Der Poorten [pdf(1,2,3,4,5,6,7,8)] p-adic Chaos and Random Number Generation [pdf] Introduction to Probability Theory [pdf] Calculus - One-Variable Calculus, with an Introduction to Linear Algebra [pdf] Introduction to Methods of Applied Mathematics or Advances Mathematical Methods for Scientists and Engineers [pdf] Tables of Integrals and other Mathematical data [pdf] Random Generators and Normal Numbers [pdf] Ramanujan's Notebooks [pdf(pdf,pdf)] Prime Percolation [pdf] Prime Numbers with a Fixed Number of One Bits or Zero Bits in Their Binary Representation [pdf] Perturbation Theory of Dynamical Systems [pdf] On Fourier and Zeta(s) [pdf] Newton's Formula and the Continued Fraction Expansion of sqrt(d) [pdf] Linear Algebra [pdf] Linear Algebra - Answers [pdf] New Representations for the Madelung Constant [pdf] Sums of Squares, Cubes, and Higher Powers [pdf] Computing A Glimpse of Randomness [pdf] Computing the Generating Function of a Series Given its First Few Terms [pdf] Asymptotic Behavior of Excitable Cellular Automata [pdf] An Efficient Algorithm for Computing the Ith Letter of phi^n(a).pdf [pdf] Algebraic Topology [pdf] A Proof of a Conjecture of Knuth [pdf] A Practical Version of the Generalized Lagrange Algorithm [pdf] Engineering Theoretical Computer Science cheat sheet [pdf] A mathematical theory of Communication [pdf] A Primer on Asynchronous Modem Communication [pdf] Dictionary of Algorithms, Data Structured, and Problems [link] Computing dictionary [link] Acronym lookup engine [link] StudyWeb search engine [link] UNIX Unix is a Four Letter Word, and Vi is a Two Letter Abbreviation [pdf] Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX [pdf] UNIX [pdf] Intermediate Unix Training [pdf] VI lovers [link] Unix Programming Tools [pdf] Unix history timeline (1969-2000) [pdf] Executable and Linkable Format (ELF) [txt] A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux [online] Guide to Unix IPC [link] The Linux Kernel API [pdf] Unreliable guide to Linux kernel locking [pdf] Unreliable guide to hacking the Linux kernel [pdf] Linux 2.4 NAT Howto [pdf] Linux advanced routing Howto [pdf] Linux Netfilter hacking Howto [pdf] Samba 2.2 [online] Samba TNG [online] USENIX Token-Mediated Certification and Electronic Commerce [pdf] The Linux BIOS [pdf] LOBOS: (Linux OS Boots OS) Booting a kernel in 32-bit mode [pdf] Miscelaneous CVS Manual [online] The Ultimate Memory Guide [pdf] The RAM Guy's Tech Notes [link] Sun-Tzu The Art of Warfare [online] Ko Ko Ko [avi] ISO Images Slackware Splackware FreeBSD Solaris [ Last edited by zsglly on 2006-1-10 at 22:34 ] |
» 猜你喜欢
计算机、0854电子信息(085401-058412)调剂
已经有5人回复
国自然申请面上模板最新2026版出了吗?
已经有13人回复
基金委咋了?2026年的指南还没有出来?
已经有3人回复
Materials Today Chemistry审稿周期
已经有5人回复
溴的反应液脱色
已经有7人回复
推荐一本书
已经有12人回复
基金申报
已经有4人回复
纳米粒子粒径的测量
已经有7人回复
常年博士招收(双一流,工科)
已经有4人回复
有没有人能给点建议
已经有5人回复












回复此楼