搜索结果: 1-3 共查到“军队指挥学 TI”相关记录3条 . 查询时间(0.187 秒)
Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations
Shift-invariant Threshold implementation Sbox
2018/11/7
The threat posed by side channels requires ciphers that can be efficiently protected in both software and hardware against such attacks. In this paper, we proposed a novel Sbox construction based on i...
Efficient Implementation of Grand Cru with TI C6x+ Processor
Grand Cru Keyed Structure of AES-128 DSP Implementation of Grand Cru
2011/7/25
Grand Cru, a candidate cipher algorithm of NESSIE project, is based on the strategy of multiple layered security and derived from AES-128.
Efficient Implementation of Grand Cru with TI C6x+ Processor
implementation / Grand Cru Keyed Structure of AES-128 DSP Implementation of
2012/3/27
Grand Cru, a candidate cipher algorithm of NESSIE project, is based on the strategy of multiple layered security and derived from AES-128. This algorithm was not selected for second phase evaluation o...