Enhancing the Performance of Encryption for Embedded Processors from the View of ISA
碩士 === 逢甲大學 === 電機工程所 === 90 === Encryption algorithms always use the technique of table lookup to perform substitution, confusion primitive. The use of table lookup is more evident in the new encryption algorithms, such as the AES finalists like Twofish, MARS, and Rijndael. A preview study about th...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2002
|
Online Access: | http://ndltd.ncl.edu.tw/handle/45nc5f |