This paper studies the implementation of bytes multiplication in GF(2~8)based on the Rijndael resource code which is published by NIST, and analyses the characteristics ofthe encryption rounds, and then propose two im...This paper studies the implementation of bytes multiplication in GF(2~8)based on the Rijndael resource code which is published by NIST, and analyses the characteristics ofthe encryption rounds, and then propose two improved schemes. Based on the technology of DSPs, wesynthetically optimize the resource code and the experiments show good results.展开更多
文摘This paper studies the implementation of bytes multiplication in GF(2~8)based on the Rijndael resource code which is published by NIST, and analyses the characteristics ofthe encryption rounds, and then propose two improved schemes. Based on the technology of DSPs, wesynthetically optimize the resource code and the experiments show good results.