登录
首页 » TEXT » ecc_verilog code

ecc_verilog code

于 2021-06-04 发布 文件大小:9410KB
0 159
下载积分: 1 下载次数: 31

代码说明:

  ELLIPTIC CURVE CRYPTOGRAPHY VERILOG CODE

文件列表:

ecc_f
ecc_f\accumulator.v
ecc_f\adder.v
ecc_f\ALU.v
ecc_f\core1.v
ecc_f\core2.v
ecc_f\core3.v
ecc_f\ecc.cmd_log
ecc_f\ecc.lso
ecc_f\ecc.ngc
ecc_f\ecc.ngr
ecc_f\ecc.prj
ecc_f\ecc.stx
ecc_f\ecc.syr
ecc_f\ecc.v
ecc_f\ecc.xst
ecc_f\ecc_envsettings.html
ecc_f\ecc_f.gise
ecc_f\ecc_f.xise
ecc_f\ecc_summary.html
ecc_f\ecc_tb_beh.prj
ecc_f\ecc_tb_isim_beh.exe
ecc_f\ecc_tb_isim_beh.wdb
ecc_f\ecc_tb_stx_beh.prj
ecc_f\ecc_top.v
ecc_f\ecc_top_tb.v
ecc_f\ecc_xst.xrpt
ecc_f\fuse.log
ecc_f\fuse.xmsgs
ecc_f\fuseRelaunch.cmd
ecc_f\iseconfig
ecc_f\iseconfig\ecc.xreport
ecc_f\iseconfig\ecc_f.projectmgr
ecc_f\isim
ecc_f\isim\ecc_tb_isim_beh.exe.sim
ecc_f\isim\ecc_tb_isim_beh.exe.sim\ecc_tb_isim_beh.exe
ecc_f\isim\ecc_tb_isim_beh.exe.sim\isimcrash.log
ecc_f\isim\ecc_tb_isim_beh.exe.sim\ISimEngine-DesignHierarchy.dbg
ecc_f\isim\ecc_tb_isim_beh.exe.sim\isimkernel.log
ecc_f\isim\ecc_tb_isim_beh.exe.sim\libPortability.dll
ecc_f\isim\ecc_tb_isim_beh.exe.sim\netId.dat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\tmp_save
ecc_f\isim\ecc_tb_isim_beh.exe.sim\tmp_save\_1
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\ecc_tb_isim_beh.exe_main.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\ecc_tb_isim_beh.exe_main.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000000398854992_0286164271.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000000398854992_0286164271.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000000398854992_0286164271.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000000693304674_1617102363.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000000693304674_1617102363.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000000693304674_1617102363.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000000827480628_3922954769.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000000827480628_3922954769.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000000827480628_3922954769.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001132379295_3985973620.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001132379295_3985973620.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001132379295_3985973620.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001463397957_4184496033.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001463397957_4184496033.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001463397957_4184496033.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001471060399_2043704360.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001471060399_2043704360.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001471060399_2043704360.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001605156739_3383896982.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001605156739_3383896982.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001605156739_3383896982.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001669554333_0368911801.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001669554333_0368911801.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001669554333_0368911801.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001768149654_3593584404.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001768149654_3593584404.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001768149654_3593584404.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001770126262_4062124004.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001770126262_4062124004.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000001770126262_4062124004.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002233491240_2389534519.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002233491240_2389534519.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002233491240_2389534519.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002345201765_0886308060.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002345201765_0886308060.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002345201765_0886308060.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002559081935_2232952690.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002559081935_2232952690.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002559081935_2232952690.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002722943949_0833183191.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002722943949_0833183191.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002722943949_0833183191.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002825947389_1796621918.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002825947389_1796621918.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002825947389_1796621918.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002828675224_1043199113.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002828675224_1043199113.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000002828675224_1043199113.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000003000135282_1756712915.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000003000135282_1756712915.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000003000135282_1756712915.nt64.obj
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000003003584523_0269087380.c
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000003003584523_0269087380.didat
ecc_f\isim\ecc_tb_isim_beh.exe.sim\work\m_00000000003003584523_0269087380.nt64.obj

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • rsa
    一个移动客户端与服务端安全交互的解决方案。 针对: http://my.oschina.net/kaster/blog/130940 客户端使用AES加密报文,使用RSA公钥加密AES密钥 服务端使用私钥解密AES密钥,再使用AES密钥解密密文 隐掉了数据压缩部分(A mobile client and server security solutions that interact. For: http://my.oschina.net/kaster/blog/130940 client packets using AES encryption, RSA public key encryption using AES key server uses the private key to decrypt the AES key, then use the AES decryption key Man hidden away part of the data compression)
    2013-08-30 10:14:56下载
    积分:1
  • DES
    说明:  本程序基于matlab实现DES算法的加密。(DES encode)
    2010-03-19 16:04:04下载
    积分:1
  • rc
    说明:  rc加密算法的源码!很具体哦!里面包含了算法的具体实现的代码!C++/C源码(rc source encryption algorithm! very specific Oh! algorithm which contains a concrete realization of the code! C++/C source)
    2008-11-26 17:17:14下载
    积分:1
  • 用VC++实现数字图象迭代混沌方法
    用VC++实现数字图象迭代混沌加密方法-with VC digital image iterative method Chaotic Encryption
    2023-06-02 22:55:02下载
    积分:1
  • 设f(x)= 1×X2 X5 X27,分别尝试写下面的移位寄存器…
    设f(x)=1+x+x2+x5+x27,试分别写出实现下列移位寄存器的程序: 以f(x)为联接多项式的DSR; 以f(x)为联接多项式的LFSR。 可供选择的联接多项式: f1(x)=1+x+x4+x6+x30; f2(x)=1+ x3+ x31; f3(x)=1+ x6+ x31; f4(x)=1+ x7+ x31; f5(x)=1+ x13+ x31; -Let f (x) = 1 x x2 x5 x27, respectively try to write the following Shift Register : f (x) connected to the DSR polynomial; f (x) for connectivity polynomial LFSR. Connection options polynomial : f (x) = 1 x x4 x6 x30; F2 (x) = 1 x3 x31; f3 (x) = 1 x6 x31; f4 (x) = 1 x11 x31; f5 (x) = 1 x13 x31;
    2022-04-07 10:24:13下载
    积分:1
  • 这是用C编写的伪随机数算法,请大虾们指教。
    这是用C编写的伪随机数加密算法,请大虾们指教。-This is prepared by using C pseudo-random number encryption algorithm, please advise their shrimp.
    2022-04-24 16:05:52下载
    积分:1
  • RSA
    用VC++开发的一款MFC程序,能很好地实现RSA加密和解密算法,对学习RSA加解密算法很有帮助(MFC with VC++ developed a program that can well realize RSA encryption and decryption algorithms, RSA encryption and decryption algorithms for learning helpful)
    2020-10-12 22:57:32下载
    积分:1
  • 大素数生成器,很好用的程序,可以很快生成,…
    大素数生成器,很好用的程序,可以快速的生成,并可以用TXT文档表示出来~-Large prime number generator, a good procedure to use, can be quickly generated, and TXT files that can be used by the ~
    2022-04-01 02:19:00下载
    积分:1
  • C51
    c51-----des --- 可以完成加密解密等功能,测试通过没问题-c51----- des------ to be completed, such as encryption and decryption functions, the test No problem! ! !
    2022-02-01 04:50:39下载
    积分:1
  • MD5
    MD5算法描述(略)。 设计一个模拟的系统用户安全登录界面,采用MD5算法实现用户登录口令的安全认证。要求模拟界面至少具有用户口令文件的注册和用户登录时输入的口令是否正确的结果提示两个功能。 (MD5 algorithm description (abbreviated). The design of a simulation system security log user interface, using MD5 algorithm users log on password security authentication. Analog interface requirements at least a registered user password files and user login password is entered when the correct results suggest that the two functions.)
    2008-06-23 11:13:42下载
    积分:1
  • 696522资源总数
  • 104047会员总数
  • 21今日下载