Description: J Secure Hash Algorithm is an important tool in the digital signature cryptography applications! Most commonly used secure hash algorithm is " # $ & the algorithm ' it is widely used in the field of e-commerce and other information security in order to meet the application on secure hash algorithm to calculate the speed of need ' the text " # $ & hardware structure of the algorithm a quick calculation the method by changing the hardware architecture (the introduction of intermediate variables' purpose' and thus improve the calculation speed to shorten the critical path! in this hardware structure)* & +- technology $/implementation can achieve data throughput of 0* 12345 ' improve 6 782 $ more than twice the performance close# $ The & Algorithms commercial 0.8 Nuclear twice!
To Search:
File list (Check if you may need any files):
快速实现SHA-1算法的硬件结构.pdf