Enhancing the Performance of Encryption for Embedded Processors from the View of ISA

碩士 === 逢甲大學 === 電機工程所 === 90 === Encryption algorithms always use the technique of table lookup to perform substitution, confusion primitive. The use of table lookup is more evident in the new encryption algorithms, such as the AES finalists like Twofish, MARS, and Rijndael. A preview study about th...

Full description

Bibliographic Details
Main Authors: Chia-Hua Liu, 劉嘉樺
Other Authors: Lerry Wang
Format: Others
Language:zh-TW
Published: 2002
Online Access:http://ndltd.ncl.edu.tw/handle/45nc5f