You are here:
Secure-IC's Securyzr™ Tunable Hash (SHA1-SHA2) Hardware accelerator
The Secure Hash Algorithm (SHA) is a family of cryptographic hash function. This family includes SHA-0, SHA-1, SHA-2 and SHA-3. The SHA IP is focused on SHA-1 and SHA-2 algorithms.
Although this algorithm is applied mainly in digital signature technology, there is a large range of other applications using this algorithm as key derivation functions (KDFs) and random bit/number generation.
Although this algorithm is applied mainly in digital signature technology, there is a large range of other applications using this algorithm as key derivation functions (KDFs) and random bit/number generation.
查看 Secure-IC's Securyzr™ Tunable Hash (SHA1-SHA2) Hardware accelerator 详细介绍:
- 查看 Secure-IC's Securyzr™ Tunable Hash (SHA1-SHA2) Hardware accelerator 完整数据手册
- 联系 Secure-IC's Securyzr™ Tunable Hash (SHA1-SHA2) Hardware accelerator 供应商