Computer Science ›› 2006, Vol. 33 ›› Issue (2): 97-99.

Previous Articles     Next Articles

LIU Hang ,DAI Guan-Zhong, LI Hui-Hui,CHEN Zan-Feng (Cyberspace Security Center, Northwestern Polytechnical University, Xi'an 710072)   

  • Online:2018-11-17 Published:2018-11-17

Abstract: The hardware-based implementation of the security algorithms, such as block cipher and message authentication, can effectively improve the security processing performance of the key network equipments. In this paper, a security algorithm hardware unit inc

Key words: Internet protocol security, Field programmable gate array, Advanced enerypt standard, Message authentication, Secure hash algorithm

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!