Home > 74V > 74VHCT04AMTCX
74VHCT04AMTCX Datasheet | Fairchild Semiconductor
Part No. : 74VHCT04AMTCX
Description : Hex Inverter
Download : 74VHCT04AMTCX Click to Download
Page Number : 8
Manufacturer : Fairchild Semiconductor
File Size : 128 Kb

74VHCT04AMTCX Article About

AES algorithm supports any packet size, key size can be any combination of 128,192,256. It is the initial time is short, the inherent parallelism of processor resources can be used effectively, a very good performance of the software. In the encryption and decryption respectively, when the environment is suitable for a limited distance and low on the ROM and RAM requirements; when the encryption and decryption at the same time when the requirements of the ROM has increased, but the environment for a limited distance. AES is also suitable for cross-access and non-interleaved two cases. In both cases, it is almost no change in performance, which makes the DSP device can effectively optimize their passwords. In addition, AES also has a wide range of applications, waiting time is short, relatively easy to conceal, the advantages of high throughput. Through comparative analysis, we can see the performance of this algorithm is superior in all aspects such as WEP, encrypted using this algorithm, the security of wireless local area network will be greatly improved, enabling the effective protection against external attacks.
Protect Datas board of directors unanimously recommended that shareholders accept the acquisition proposal, which holds 10.46% equity shareholder Monterro Holding companies are also strongly supported. Protect Data is the parent company of Pointsec Mobile Technologies. Pointsec to provide notebook and desktop computers, PDA and smart phones for data security technology. Check Point, based in Israel, said the acquisition of Pointsec is to promote the first step in enterprise data protection strategy. Check Point CEO Gil Shwed said: "The consequences of corporate data leakage is getting worse, the law has become more stringent. Clearly it is necessary to protect the network infrastructure extends from the data itself."

All rights reserved:iceach.com © 2000-2010 Certificate No.:Guangdong ICP No.08108781