A paper on the Rijndael ENCryption/decryption algorithm (now known as the AES standard) written by the authors.
标签: ENCryption decryption algorithm the
上传时间: 2013-12-31
上传用户:ccclll
A public-domain example implementation of the AES (Rijndael) ENCryption algorithm.
标签: implementation public-domain ENCryption algorithm
上传时间: 2013-12-03
上传用户:thuyenvinh
ENCryption tool for delphi 2007. Conatain: Blowfish, MD5...
标签: ENCryption Conatain Blowfish delphi
上传时间: 2014-01-13
上传用户:haoxiyizhong
Its a ENCryption tool for delphi 7. Its can encrypt with blowfish, md5, base64...
标签: ENCryption Its blowfish encrypt
上传时间: 2014-01-20
上传用户:大融融rr
Tiny ENCryption Algorithm for secure communication.
标签: communication ENCryption Algorithm secure
上传时间: 2014-01-03
上传用户:大三三
Application to generate Diffie-Hellman algorith ENCryption
标签: Diffie-Hellman Application ENCryption generate
上传时间: 2017-09-18
上传用户:气温达上千万的
File System Filter Driver Example Code.. File ENCryption Sample ..
标签: File ENCryption Example Driver
上传时间: 2017-09-27
上传用户:jcljkh
本论文讨论的是如何对符合DVB-T标准的数字图像无线监控系统中的MPEG2图像实现底层硬件的实时加/解密.数字图像无线监控系统是某公司研发的符合DVB-T标准的实时图像语音无线传输系统,通过对实时采集的图像等信息的发射与接收实现对远程现场的无线监控.为了保证图像数据在传输中的保密性,设计了基于FPGA的实时MPEG2图像加/解密系统.该系统由加/解密算法模块和密钥管理模块组成.加/解密算法模块完成发射机及接收机中的实时数据流的加/解密,该模块是基于FPGA的,采用美国国家标准DES(Dara ENCryption Standard)算法,实现了对MPEG2 TS流的硬件加/解密.密钥管理模块完成加/解密模块的密钥产生、管理、控制、输入等功能.本论文首先介绍了密码学的基本知识及几种典型的加密体制和算法.接着介绍了DVB-T数字广播标准和数字图像无线监控系统的原理和系统结构.然后对图像加解密器的系统设计原理及实现做了详细介绍.在此基础上,介绍了FPGA中的加密算法的仿真及实现和密钥管理模块的实现.最后介绍了系统的硬件电路和整个系统的软硬件调试.本人的工作主要包括:1.查阅资料,了解密码学及DVB系统相关领域知识.2.根据项目要求设计基于FPGA的实时MPEG2图像加/解密系统方案.3.基于FPGA完成MPEG2图像的底层硬件加密及解密逻辑程序设计,并设计各个控制程序和驱动.4.设计系统原理图及电路板,完成系统的软硬件调试和与全系统的联调.
上传时间: 2013-06-30
上传用户:jiiszha
读取STM32芯片内部唯一的标识,用于加密等区别其他芯片的操作,有完整注释,测试通过-STM32 chip to read a unique identifier for the ENCryption and other differences other chip operation, with complete notes, test
上传时间: 2013-05-24
上传用户:793212294
Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, anddistributed control systems (DCSs), and then discusses security issues and remedies. This document alsoexplains the benefits and limitations of two cryptographic solutions (digital signatures and ENCryption) andelaborates on the reasons for using security ICs in an ICS to support cryptography.
上传时间: 2013-10-09
上传用户:woshinimiaoye