You are here:
Tunable Hash (SHA1-SHA2) accelerator
The Secure Hash Algorithm (SHA) is a family of cryptographic hash function. This family includes SHA-0, SHA-1, SHA-2 and SHA-3. The SHA IP is focused on SHA-1 and SHA-2 algorithms.
Although this algorithm is applied mainly in digital signature technology, there is a large range of other applications using this algorithm as key derivation functions (KDFs) and random bit/number generation.
Although this algorithm is applied mainly in digital signature technology, there is a large range of other applications using this algorithm as key derivation functions (KDFs) and random bit/number generation.
查看 Tunable Hash (SHA1-SHA2) accelerator 详细介绍:
- 查看 Tunable Hash (SHA1-SHA2) accelerator 完整数据手册
- 联系 Tunable Hash (SHA1-SHA2) accelerator 供应商