Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (4)
NFC Type 2 Tag scheduler
no vote
It is used to operate NFC type 2 tag, provide read, write of raw data, identify uid, set delay time, and customize operation itinerary, make mobile phone become reader to schedule work, continuously read and write data in tag, and perform IO or communication operation on interface tag conforming to the protocol.
davens
2016-08-23
0
1
HL5309 IC driver example
no vote
The HL5309 operator makes the firmware within cases, a Hobby could use this in your area go to control HL5309 IC,HL5309 IC Agape Xie Mifare Ultralight tag may Ying used in toys, uprated by syndrome differentiation of identity consciousness, such as Gatwick-ban.
davens
2016-08-23
0
1
Elliptic curves crypto
4.3
secp128r1, secp160k1, secp224k1 crypto,Elliptic curves, it is a example for demo elliptic curves crypto. and it can generate private and public code. you can verify your key in this example. thank you.
davens
2016-08-23
0
1
RSA crypto
no vote
This source code is used to test the RSA encryption and decryption operation, results were verified then measured, ' you can use this product in PSE-FIFA Gong Yao Yao/private encryption and decryption of your files.
davens
2014-08-27
0
1
No more~