资源列表
rtl_wangjiangxing
- ecc椭圆算法RTL,verilog经过验证-ecc verilog
HASH
- hash加速器的verilog实现,也用于fpga或asic-hash verilog rtl
AES
- aes源码verilog带有仿真环境,可用于FPGA实现-aes verilog rtl
pka_engine
- rsa ecc加速器源码和仿真环境,用于fpga-rsa ecc rtl and sim
sm4_length_issue
- SM4的Java实现-SM4 Java..........................
Crc
- crc的生成与验证,包括16位,8位,32位-CRC generation and validation, including 16, 8, 32 bits
testSCRATE
- 非对称加密,以RSA算法为例,实现数据的加密解密,有完整的算法。本程序只是简单的示例。不包含网络环境。-Asymmetric encryption, RSA algorithm, for example, data encryption and decryption, a complete algorithm. This program is just a simple example. Does not include the network environment.
fingerprint-overview
- Fingerprint Identification is the method of identification using the impressions made by the minute ridge formations or patterns found on the fingertips. No two persons have exactly the same arrangement of ridge patterns, and the patterns of any
AESClass4VB6
- AES加密類別FOR Visual Basic 6
DTproTest
- DTproTest滴水动态变形-飘功能例子.rar-DTproTest example DTproTest example
DecodeStrategy
- 本代码实现三种解密的策略,包括顺序查找法,折半查找法以及斐波那契查找法-This code decryption achieve three strategies, including sequential search method, binary search method, and the Fibonacci search method
hundunyingshe
- 基于混沌映射的图像加密算法是目前研究的主流,该本件中包含五类混沌映射,有一维混沌映射、二维混沌映射以及三个超混沌映射。- Image encryption algorithm based on chaotic map is mainstream research, which this piece contains five chaotic map, there is a one-dimensional chaotic maps, as well as three-dimensional c
