Description: 二进制平方和乘方的幂模算法,是密码学中的重要问题.这里提供他的简单算法.-binary square and involution of Power Modules algorithms, cryptography is the most important issue. Here he provides a simple algorithm. Platform: |
Size: 24716 |
Author:周磊 |
Hits:
Description: 二进制平方和乘方的幂模算法,是密码学中的重要问题.这里提供他的简单算法.-binary square and involution of Power Modules algorithms, cryptography is the most important issue. Here he provides a simple algorithm. Platform: |
Size: 24576 |
Author:周磊 |
Hits:
Description: 本代码能实现密码学领域中的大数幂模运算,并且运算效率较高,对进一步实现RSA加密、解密运算的实现有很大的帮助。-This code can achieve in the field of cryptography module computing power of large numbers, and operations more efficient, to further the realization of RSA encryption, decryption operations of great help to realize. Platform: |
Size: 193536 |
Author:zhang |
Hits:
Description: 一篇数学论文。讨论了数论中关于幂指式同余的周期性问题,给出了最小正周期的表达式和几个关于幂指式同余周期的性质。为快速构造或化简同余幂指式提供了一般方法。对研究密码学,尤其是讨论RSA公钥密码体制有一定参考价值。-A mathematical papers. Discussed for a number of means on the power-type with more than a cyclical problem, given the smallest cycle is the expression of and a few on the power-type congruence refers to the nature of cycles. For the rapid construction or congruence of Jane style refers to power provided a general approach. The study of cryptography, especially the discussion of RSA public-key cryptosystem has a certain reference value. Platform: |
Size: 3282944 |
Author: |
Hits:
Description: 大数的模幂算法(GUI),用密码学课本中的算法,快速、高效。计算(x的r次方) mod p 的值-Large numbers of modular exponentiation algorithm (GUI), used cryptography algorithm textbooks, fast and efficient. Calculation of (x of the r-th power) mod p value Platform: |
Size: 22528 |
Author:LYC |
Hits:
Description: We present elliptic curve cryptography (ECC) coprocessor,
which is dual-field processor with projective
coordinator. We have implemented architecture for scalar
multiplication, which is key operation in elliptic curve
cryptography. Our coprocessor can be adapted both prime field
and binary field, also contains a control unit with 256 bit serial
and parallel operations , which provide integrated highthroughput
with low power consumptions. Our scalar multiplier
architecture operation is perform base on clock rate and produce
better performance in term of time and area compared to similar
works. We used Verilog for programming and synthesized using
Xilinx Vertex II Pro devices. Simulation was done with Modelsim
XE 6.1e, VLSI simulation software from Mentor Graphics
Corporation especially for Xilinx devices. Platform: |
Size: 116736 |
Author:陳曉慧 |
Hits:
Description: This project presents FPGA implementations of the DES and Triple-DES with improved security against power analysis attacks. The proposed designs use Boolean masking, a previously introduced technique to protect smart card implementations from these attacks. Triple DES was the answer to many of the shortcomings of DES. Since it is based on the DES algorithm, it is very easy to modify existing software to use Triple DES. It also has the advantage of proven reliability and a longer key length that eliminates many of the shortcut attacks that can be used to reduce the amount of time it takes to break DES. However, even this more powerful version of DES may not be strong enough to protect data for very much longer. The DES algorithm itself has become obsolete and is in need of replacement.DES encrypts data in 64-bit and it is a symmetric algorithm. The key length is 56-bits.
KEY WORDS: DES, Encryption, Decryption, Cryptography, Simulation, Synthesis, TDES, Cipher.
Platform: |
Size: 5363712 |
Author:abilash |
Hits: