|
||
www.design-reuse-embedded.com |
Tunable Hash (SHA1-SHA2) accelerator
|
|
Overview The Secure Hash Algorithm (SHA) is a family of cryptographic hash function. This family includes SHA-0, SHA-1, SHA-2 and SHA-3. The SHA IP is focused on SHA-1 and SHA-2 algorithms.
Although this algorithm is applied mainly in digital signature technology, there is a large range of other applications using this algorithm as key derivation functions (KDFs) and random bit/number generation.
Please sign in to view full IP description :
|
Partner with us |
List your ProductsSuppliers, list and add your products for free. |
More about D&R Privacy Policy© 2024 Design And Reuse All Rights Reserved. No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse. |
||||||