登录
首页 » 加密解密 » VHDL实现128bitAES加密算法 LOW AREA节约成本的实现 DATA FLOW为8bits

VHDL实现128bitAES加密算法 LOW AREA节约成本的实现 DATA FLOW为8bits

于 2022-01-26 发布 文件大小:19.57 kB
0 89
下载积分: 2 下载次数: 1

代码说明:

VHDL实现128bitAES加密算法 LOW AREA节约成本的实现 DATA FLOW为8bits-VHDL realize 128bitAES encryption algorithm LOW AREA realize cost-saving DATA FLOW for 8 bits

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 数字电视中的
    数字电视中的加密-Encryption of digital TV
    2022-06-20 08:15:12下载
    积分:1
  • 这个是IDEA算法的源代码(C语言版本)
    这个是IDEA加密算法的源代码(C语言版本)-This is the IDEA encryption algorithm source code (C language version)
    2022-08-19 12:57:06下载
    积分:1
  • 这个是一款不错的文件软件,能让你的隐私文件受到严的保护....
    这个是一款不错的文件加密软件,能让你的隐私文件受到严密的保护.-this is a good document encryption software that can make your documents to be subject to stringent privacy protection.
    2022-05-22 23:01:49下载
    积分:1
  • a sample algorithm of rsa in langage C
    a sample algorithm of rsa in langage C-a sample algorithm of rsa in langage C++
    2023-02-04 03:10:04下载
    积分:1
  • 码生成器,很好用
    密码生成器,很好用-password generator, a good use
    2022-11-24 12:30:03下载
    积分:1
  • implementation of rijndael furious algorithm to encrypt and decrypt information
    implementation of rijndael furious algorithm to encrypt and decrypt information
    2022-07-18 19:30:46下载
    积分:1
  • ieee一种基于混沌的新方法An Image Encryption Scheme Based on Chaotic Map...
    ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security
    2022-05-30 11:41:05下载
    积分:1
  • 一个免费实用的DELPHI AES 算法函数包及演示文件,给有需要的朋友...
    一个免费实用的DELPHI AES 加密算法函数包及演示文件,给有需要的朋友-a free practical DELPHI AES encryption algorithm function package and demonstrate the documents to a friend in need
    2023-08-03 10:35:04下载
    积分:1
  • 128192和256位钥的码Twofish的VHDL实现。
    VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.-VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some
    2022-07-08 23:33:44下载
    积分:1
  • 这本书包括了码学和水印学竞争在内的各方面技术,这本书的内容覆盖知识范围广博,书中还有经过整理的代码,源代码等。...
    这本书包括了密码学和水印学竞争在内的各方面技术,这本书的内容覆盖知识范围广博,书中还有经过整理的代码,源代码等。-This book includes the study of cryptography and watermarking competition, including all aspects of technology, the content of this book cover a broad range of knowledge, the book also after finishing the code, source code and so on.
    2022-08-26 12:53:26下载
    积分:1
  • 696518资源总数
  • 104269会员总数
  • 31今日下载