期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
电视新闻加/解密系统的设计
1
作者 易孟良 《航空军转民技术与产品》 1998年第11期27-28,共2页
关键词 电视新闻 工作原理 加密/解密系统
下载PDF
A low-cost compact AES architecture for wireless sensor network
2
作者 易立华 Zou Xuecheng Liu Zhenglin Dan Yongping Zou Wanghui 《High Technology Letters》 EI CAS 2010年第2期184-188,共5页
The implementation of small size cryptography algorithm is a critical problem for wireless sensor network. A low cost compact intellectual property (IP) core of the entire advanced encryption standard (AES) algori... The implementation of small size cryptography algorithm is a critical problem for wireless sensor network. A low cost compact intellectual property (IP) core of the entire advanced encryption standard (AES) algorithm for wireless sensor network is presented in this paper. A compact encryption and decryption system using only four sharing S-Boxes is obtained, employing sharing between the encryption and decryption processes. Our design proposes use of composite field data path for the SubBytes and InvSubBytes transformations. With an implementation of the AES block cipher with Virtex Ⅱ Pro FPGA using0.13μm and 90nm process technology, our area optimized consumes 16.8k equivalent gates. The speed of this implementation is also reduced to 0.45Gbits/s. Compared with previous implementations, our design achieves significant low-cost area with acceptable throughput. 展开更多
关键词 advanced encryption standard (AES) S-Boxes key expansion implement
下载PDF
Research on General Permutation Encryption Module Based on Chaos Theory
3
作者 Sun Wenjie 《International Journal of Technology Management》 2014年第7期58-61,共4页
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For examp... Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system. 展开更多
关键词 chaos theory general substitution encryption.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部