-
128192和256位密钥的密码Twofish的VHDL实现。
VHDL implementation of the twofish cipher for 128,192 and 256 bit keys.
The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.-VHDL implementation of the twofish cipher for 128,192 and 256 bit keys.
The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some
- 2022-07-08 23:33:44下载
- 积分:1
-
et框架由于拥有CLR提供的丰富库支持,只需很少的代码即可实现先前使用C等旧式语言很难实现的加密算法。本类实现一些常用机密算法,供参考。其中MD5算法返回Int...
et框架由于拥有CLR提供的丰富库支持,只需很少的代码即可实现先前使用C等旧式语言很难实现的加密算法。本类实现一些常用机密算法,供参考。其中MD5算法返回Int的ToString字串。返回数字字母型结果的算法参见之前Blog文章-* This program is free software you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation either version 2, or (at your option) any
* later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program if not, write to the Free Software Foundation,
* Inc., 59 Temple Place- Suite 330, Boston, MA 02111-1307, USA.
- 2022-05-19 19:13:03下载
- 积分:1
-
我写的利用IDEA算法的加密程序,并含文件切割和合并功能。
我写的利用IDEA算法的加密程序,并含文件切割和合并功能。-I write using IDEA algorithm encryption procedures, and documents containing cutting and consolidation functions.
- 2022-01-25 18:02:42下载
- 积分:1
-
DCPcrypt Cryptographic Component Library
DCPcrypt Cryptographic Component Library
- 2022-08-03 06:46:51下载
- 积分:1
-
这个例子描述了MD4碰撞,很有研究价值,大家可以仔细研究下...
这个例子描述了MD4碰撞,很有研究价值,大家可以仔细研究下-MD4碰撞
- 2022-07-14 20:29:23下载
- 积分:1
-
用VC做的一个画直线和曲线的程序。
用VC做的一个画直线和曲线的程序。-VC do a painting line and curve procedure.
- 2022-01-21 02:05:25下载
- 积分:1
-
沙
SHA-1Hash函数源码,可以对任何文件做Hash,得到的Hash值为160位。具有抗强碰撞,弱碰撞等能力。虽然王小云已经找到了个别碰撞。但在新的好的hash函数出来之前仍将被广泛使用。-SHA-1Hash function source, any document can be done right hash, the hash value of 160. Anti-collision, the weak capabilities of the collision. Although Bruce Schneier, had found individual collisions. But the new good hash function will be out before widespread use.
- 2023-06-21 07:50:03下载
- 积分:1
-
- 2022-06-27 03:44:25下载
- 积分:1
-
利用VC来实现一个简单的DES加密程序,他能完成DES算法的全部步骤,不过只能使用64位密码对64位明文进行加密...
利用VC来实现一个简单的DES加密程序,他能完成DES算法的全部步骤,不过只能使用64位密码对64位明文进行加密-VC to achieve a simple DES encryption program, he can finish all the DES algorithm steps, but only use 64 to 64 passwords expressly encryption
- 2022-03-02 17:29:33下载
- 积分:1
-
BlowFish加密算法
BlowFish加密算法-BlowFish encryption algorithm
- 2022-03-31 14:56:26下载
- 积分:1