登录
首页 » Unix_Linux » trunk

trunk

于 2021-03-29 发布 文件大小:26KB
0 160
下载积分: 1 下载次数: 9

代码说明:

  AES128加密解密verilog程序,通过modelsim验证过(AES128 encryption and decryption verilog program, verified by modelsim)

文件列表:

rtl
...\aes_core.v,5678,2014-12-25
...\aes_ip.v,2442,2014-12-25
...\control_unit.v,15079,2014-12-25
...\datapath.v,14218,2014-12-25
...\data_swap.v,2849,2014-12-25
...\host_interface.v,11025,2014-12-25
...\key_expander.v,4916,2014-12-25
...\mix_columns.v,4347,2014-12-25
...\sBox.v,2377,2014-12-25
...\sBox_8.v,8337,2014-12-25
...\shift_rows.v,4170,2014-12-25
testbench
.........\aes_tb_vpi.v,5368,2014-12-25
.........\tb_aes_ip.v,19216,2014-12-25

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 老外写的库cryptlib(版本3.1)
    老外写的加密库cryptlib(版本3.1)-foreigner to write encryption for cryptlib (version 3.1)
    2022-07-03 06:20:10下载
    积分:1
  • 使用openssl库,公钥对数据进行的dll库的源代码
    使用openssl库,公钥对数据进行加密的dll库的源代码-Using openssl library, public key data encryption dll library source code
    2022-03-18 05:44:34下载
    积分:1
  • bvymc
    无须解压密码,利用自己设计的程序同样可以实现对控制面板内容的控制,(Do not need to unzip password, to use its own design program can also realize the control of the content of the control panel,)
    2017-06-16 21:55:54下载
    积分:1
  • COM文件
    COM文件加密 -COM document encrypts
    2022-03-11 20:30:03下载
    积分:1
  • MD5-(2)
    简单的MD5进行加密处理字符串,得到结果保存到。txt中(Simple MD5 encrypted string, the results are saved to. txt in the)
    2012-06-15 13:05:56下载
    积分:1
  • ieee一种基于混沌的新方法An Image Encryption Scheme Based on Chaotic Map...
    ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security
    2022-05-30 11:41:05下载
    积分:1
  • ATSHA204
    atmel系列加密芯片资料,ATSHA204芯片手册。希望对编写驱动的朋友有所帮助!(Atmel series data encryption chip, manual ATSHA204 chip. Hope to write a driver for friends to help!)
    2016-03-01 15:29:14下载
    积分:1
  • dct_2
    图象水印的一种基于dct的简单算法例子 期望能对刚开始涉及数字水印的朋友有一点帮助(a watermark image based on a simple algorithm Extra examples can expect to start digital watermarking friends a little help)
    2006-06-03 03:42:30下载
    积分:1
  • 自己敲的混沌
    说明:  简单的混沌加密,在网易云课堂听课,做的笔记,简单的几个混沌加密,数字水印混沌加密,混沌加密生成二值图像、灰度图像、RGB图像(Simple chaos encryption, in the netease cloud class, take notes, a few simple chaos encryption, digital watermark chaos encryption, chaos encryption generated binary image, gray image, RGB image)
    2019-11-09 10:31:56下载
    积分:1
  • pgpencrypt.rar
    pgpencrypt.rar
    2023-06-18 19:35:04下载
    积分:1
  • 696522资源总数
  • 104042会员总数
  • 18今日下载