• Cypress S27KL0641 HyperRAM中文用户手册

    特殊特性 HyperRAM 低电平信号计数接口 3.0 V I/O, 11 个总线信号 – 单端时钟(CK) 1.8 V I/O, 12 个总线信号 – 差分时钟(CK、CK#) 芯片选择(CS#) 8 位数据总线(DQ[7:0]) 读写数据选通(RWDS) – 双向数据选通/ 掩码 – 在开始执行任何操作时作为输出,用于指示刷新延迟 – 在读取过程中作为输出,其功能是读取数据选通 – 在写入过程中作为输入,其功能是写入数据掩码 RWDS DCARS 时序 – 在读取过程中,与CK 相移的第二时钟是RWDS 的偏移 – 相移的时钟用于将RWDS 切换沿移动到读数据眼图范围内 高性能 高达333 MB/s 双数据速率(DDR):每个时钟周期内进行两个数据传输 VCC = 1.8 V 时,时钟频率可达166 MHz(相应速率为 333 MB/s) VCC = 3.0 V 时,时钟频率可达100 MHz(相应速率为 200 MB/s) 顺序突发操作 可配置突发特性 – 循环突发长度: – 16 个字节(8 个时钟周期) – 32 个字节

    0
    134
    4.59MB
    2023-02-08
    10
  • NIST.FIPS.200.pdf

    NIST.FIPS.200.pdf

    0
    82
    214KB
    2021-09-29
    10
  • FIPS-140-2-CMVP Management Manual 09-09-2021.pdf

    FIPS-140-2-CMVP Management Manual 09-09-2021.pdf

    0
    54
    797KB
    2021-09-29
    10
  • Draft FIPS-140-3-CMVP Management Manual 09-18-2020.pdf

    Draft FIPS-140-3-CMVP Management Manual 09-18-2020.pdf

    0
    66
    835KB
    2021-09-29
    5
  • NIST.FIPS.186-5-draft.pdf

    (P256/P384/P521/W25519/W448/Curve25519/Edwards448)

    0
    75
    1.39MB
    2021-08-31
    9
  • SHA_All.pdf

    NIST 官方Secure Hash function 测试数据, 包括SHA1和SHA2所有变种

    0
    68
    980KB
    2021-08-10
    10
  • AES_Core_All.pdf

    AES 官方测试数据, 包含ECB/CBC/CTR/CFB/OFB, key 128/192/256的所有数据及其计算中间数,方便测试设计

    0
    74
    1.29MB
    2021-08-10
    12
  • FIPS1402IG.pdf Implementation Guidance for FIPS 140-2

    FIPS1402IG.pdf Implementation Guidance for FIPS 140-2

    0
    113
    4.61MB
    2021-06-04
    10
  • NIST.FIPS.186-4.pdf Digital Signature Standard (DSS)

    This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature as evidence in demonstrating to a third party that the signature was, in fact, generated by the claimed signatory. This is known as non-repudiation, since the signatory cannot easily repudiate the signature at a later time.

    0
    144
    774KB
    2021-06-04
    9
  • NIST.SP.800-185.pdf SHA-3 Derived Functions:cSHAKE, KMAC

    This Recommendation specifies four types of SHA-3-derived functions: cSHAKE, KMAC, TupleHash, and ParallelHash, each defined for a 128- and 256-bit security strength. cSHAKE is a customizable variant of the SHAKE function, as defined in Federal Information Processing Standard (FIPS) 202. KMAC (for KECCAK Message Authentication Code) is a variable-length message authentication code algorithm based on KECCAK; it can also be used as a pseudorandom function. TupleHash is a variable-length hash function designed to hash tuples of input strings without trivial collisions. ParallelHash is a variable-length hash function that can hash very long messages in parallel.

    0
    148
    490KB
    2021-06-04
    9
  • 分享精英

    成功上传11个资源即可获取
  • 分享达人

    成功上传6个资源即可获取
  • 签到新秀

    累计签到获取,不积跬步,无以至千里,继续坚持!
  • 分享小兵

    成功上传3个资源即可获取
  • 分享学徒

    成功上传1个资源即可获取
关注 私信
上传资源赚积分or赚钱