登录

最新会员 最新下载

成为了本站VIP会员

04月23日 14:46

成为了本站VIP会员

04月18日 20:09

成为了本站VIP会员

04月18日 18:37

成为了本站VIP会员

04月18日 18:25

成为了本站VIP会员

04月18日 17:16

成为了本站VIP会员

04月18日 09:16
已选条件
  1. 编程语言:VHDL
  2. 代码类别:加密解密
  3. 发布时间:不限
全部撤销
编程语言 更多 收起
代码类别 更多 收起
发布时间
更多选项

1. CLZ32

  针对32位MIPS微处理器中CLZ指令(对单个字高位连零进行计数)的实现电路,使用了类似于超前进位的逻辑结构。包含测试文档,以及Design Compile所用的环境和脚本。(The CLZ instruction counts the number of leading zeros in a word. The 32-bit word in the GPR rs is scanned from most-significant to least-significant bit.The number of leading zeros is counted and the result is written to the GPR rd. If all 32 bits are cleared in the GPR rs, the result written to the GPR rd is 32. )

16
下载
110
浏览
2021-03-31发布

2. CLZ32

  针对32位MIPS微处理器中CLZ指令(对单个字高位连零进行计数)的实现电路,使用了类似于超前进位的逻辑结构。包含测试文档,以及Design Compile所用的环境和脚本。(The CLZ instruction counts the number of leading zeros in a word. The 32-bit word in the GPR rs is scanned from most-significant to least-significant bit.The number of leading zeros is counted and the result is written to the GPR rd. If all 32 bits are cleared in the GPR rs, the result written to the GPR rd is 32. )

15
下载
90
浏览
2021-03-31发布

3. SHA256

  SHA256加密过程,非常详细,内附原码,还有文档,很可用~(SHA256 encryption process, very detailed, containing the original code, as well as documents, it is available ~)

19
下载
260
浏览
2020-11-25发布

4. SoftCore_LED80-master

说明:  使用VHDL实现的LED-80分组密钥,相对于其它密钥具有硬件实现面积更小的特点(vhd code of a lightweight block cipher LED-80)

0
下载
114
浏览
2020-03-24发布

5. PUF_TRNG

  this is a verilog code of true random number generator using butterfly puf

12
下载
114
浏览
2017-04-22发布

6. Encryption

  reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption

4
下载
89
浏览
2016-04-11发布

7. ASIC______

  ASIC design and synthesis

3
下载
97
浏览
2010-03-14发布

8. fpga_security

  The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.

2
下载
84
浏览
2009-05-15发布