CN115941179A - Method for realizing password conversion on ASIC chip - Google Patents
Method for realizing password conversion on ASIC chip Download PDFInfo
- Publication number
- CN115941179A CN115941179A CN202310111788.2A CN202310111788A CN115941179A CN 115941179 A CN115941179 A CN 115941179A CN 202310111788 A CN202310111788 A CN 202310111788A CN 115941179 A CN115941179 A CN 115941179A
- Authority
- CN
- China
- Prior art keywords
- password
- rule
- transformation
- command
- logic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 238000006243 chemical reaction Methods 0.000 title claims description 38
- 230000009466 transformation Effects 0.000 claims abstract description 75
- 230000008569 process Effects 0.000 claims abstract description 16
- 230000008859 change Effects 0.000 claims abstract description 10
- 230000000694 effects Effects 0.000 claims description 7
- 238000003780 insertion Methods 0.000 claims description 7
- 230000037431 insertion Effects 0.000 claims description 7
- 238000012217 deletion Methods 0.000 claims description 6
- 230000037430 deletion Effects 0.000 claims description 6
- 230000001131 transforming effect Effects 0.000 claims description 2
- 238000010276 construction Methods 0.000 claims 1
- 230000005540 biological transmission Effects 0.000 abstract description 9
- 238000004364 calculation method Methods 0.000 abstract description 7
- 238000004891 communication Methods 0.000 abstract description 3
- 230000006872 improvement Effects 0.000 description 7
- 238000005336 cracking Methods 0.000 description 5
- 238000013461 design Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 3
- 238000009472 formulation Methods 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 102100030488 HEAT repeat-containing protein 6 Human genes 0.000 description 1
- 101000990566 Homo sapiens HEAT repeat-containing protein 6 Proteins 0.000 description 1
- 101000801684 Homo sapiens Phospholipid-transporting ATPase ABCA1 Proteins 0.000 description 1
- 206010043417 Therapeutic response unexpected Diseases 0.000 description 1
- 101150090313 abc1 gene Proteins 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005034 decoration Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000011426 transformation method Methods 0.000 description 1
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Storage Device Security (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
Abstract
The invention relates to the technical field of password transformation, in particular to a method for realizing password transformation on an ASIC chip. The method comprises the steps of establishing a password change overall process, storing password transformation rules, constructing a password transformation model, realizing a password rule command transformation function according to the password transformation model and realizing a plurality of rule command continuous transformation functions by using a multi-stage production line. The invention effectively reduces the huge difference between the password transmission speed and the calculation speed by using the rule transformation; under the condition of the same calculated amount, the bandwidth occupied by password input is greatly reduced, and the communication pressure in the working process of the chip can be effectively relieved; meanwhile, the flexibility of the password dictionary is improved, and the success rate of password decoding can be obviously improved.
Description
Technical Field
The invention relates to the technical field of password transformation, in particular to a method for realizing password transformation on an ASIC chip.
Background
Password cracking is an important group branch of password cracking, most encryption keys are obtained by directly or indirectly calculating passwords at present, an ASIC chip is used for realizing the password cracking function, and the password cracking device has a series of advantages of high integration level, high cracking speed, low power consumption and the like; but the method is limited by the limitations of chip area, power consumption, design complexity and the like, and the problems of insufficient flexibility of using the password, overlarge difference between the password transmission speed and the calculation speed and the like exist in the chip.
In the software level, input passwords are subjected to programmable rule transformation, and assuming that the number of rules is N, each input password can generate N new passwords which have the same basic information but play an important role in actual password deciphering: the password decoding rate is effectively improved under the condition of increasing a certain amount of calculation.
The rule transformation function is realized on the ASIC password decoding chip, so that the difference between the password transmission speed and the calculation speed is relieved; secondly, the flexibility of password deciphering application is expanded; and thirdly, the bandwidth required by password transmission is reduced, and if N rules are transmitted, the actually generated password quantity is N times of the password transmission quantity.
Disclosure of Invention
The present invention is directed to a method for implementing password transformation on an ASIC chip to solve the problems set forth in the background art.
To achieve the above object, there is provided a method for implementing password transformation on an ASIC chip, comprising the steps of:
s1, formulating a password change overall process;
s2, storing password transformation rules;
s3, constructing a password transformation model;
s4, a password rule command conversion function is realized according to the password conversion model;
and S5, realizing a continuous transformation function of a plurality of rule commands by using a multistage assembly line.
As a further improvement of the technical solution, the process establishing method in S1 includes the following steps:
s1.1, inputting the number of rules, and storing the input rules;
s1.2, inputting an initial password, and changing the password according to an input rule;
s1.3, judging whether the password is processed or not, and generating a conversion password after the initial password is processed;
and S1.4, judging whether the rule is changed completely, forming a new rule after the rule is changed completely, and changing the initial password according to the new rule.
As a further improvement of the technical solution, the storage method for storing the password transformation rule in S2 is as follows:
s2.1, making a corresponding rule;
and S2.2, the chip formulates a corresponding register for storing a corresponding rule.
As a further improvement of the technical solution, the method for constructing the password transformation model in S3 comprises the following steps:
s3.1, defining a password transformation command;
and S3.2, combining the password transformation command to generate a new rule.
As a further improvement of the present technical solution, the step of defining the password transformation command definition rule in S3.1 is as follows:
s3.1.1, naming the command for interface conversion;
s3.1.2, formulating a corresponding password conversion command format;
s3.1.3, making a corresponding input password;
and S3.1.4, formulating a corresponding output password.
As a further improvement of the technical solution, the implementation method for implementing the password rule command transformation function according to the password transformation model in S4 includes the following steps:
s4.1, determining a corresponding logic module according to each rule;
s4.2, storing the input password and the output password into a register, and storing the rule into another register;
and S4.3, determining the upper limit of the number of the commands supported by each rule according to the requirement.
As a further improvement of the technical solution, the logic module in S4.1 includes command selection logic, password end additional character logic, password end character deletion logic, password first insertion character logic, password first character deletion logic, letter case change logic, designated character replacement logic, and password overall repetition logic.
As a further improvement of the technical solution, the method for continuously transforming the rule command in S5 includes the following steps:
s5.1, determining rule transformation quantity according to a command combination mode;
and S5.2, removing the rules with poor effects according to the instruction use effect, and adding new rules.
Compared with the prior art, the invention has the beneficial effects that:
1. in the method for realizing the password conversion on the ASIC chip, the great difference between the password transmission speed and the calculation speed is effectively reduced by using the rule conversion; under the condition of the same calculated amount, the bandwidth occupied by password input is greatly reduced, and the communication pressure in the working process of the chip can be effectively relieved; meanwhile, the flexibility of the password dictionary is improved, and the success rate of password decoding can be obviously improved.
2. In the method for realizing password conversion on the ASIC chip, corresponding rules are formulated, and the input rules are specially stored by using a register in the chip, and are used for password conversion, and can be updated at any time according to scheduling requirements, so that the flexibility requirement is met; all passwords can be kept unchanged before processing is completed, and the requirement for reducing password transmission bandwidth is met.
Drawings
FIG. 1 is a flowchart illustrating the overall steps of the present invention;
FIG. 2 is a flow chart of a method of flow formulation of the present invention;
FIG. 3 is a flow chart of a storage method of the present invention;
FIG. 4 is a flow chart of a method of constructing a password transformation model of the present invention;
FIG. 5 is a flow chart of the define rule steps of the present invention;
FIG. 6 is a flow chart of an implementation of the present invention;
FIG. 7 is a flowchart of the method steps of the rule command continuous transformation of the present invention;
FIG. 8 is an overall flow chart of password conversion according to the present invention.
Detailed description of the preferred embodiments
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-8, a method for implementing password transformation on an ASIC chip is provided, which includes the following steps:
s1, formulating a password change overall process;
s2, storing password transformation rules;
s3, constructing a password transformation model;
s4, realizing a password rule command conversion function according to a password conversion model;
and S5, realizing a continuous conversion function of a plurality of rule commands by using a multi-stage pipeline.
When the method is used, firstly, a password change overall flow is formulated, batch rule conversion processing is carried out on batch passwords through password conversion, new passwords are generated and provided for a calculation core to use, a group of rules (assuming N numbers) are input into a chip, the group of conversion is completed for each input password, namely N new passwords are generated, password conversion rules are stored, a group of rules (assuming M numbers) are input into the chip before the password is changed, M rules are converted for each password, namely M x N new instructions are generated, meanwhile, M rules are stored through the chip, a password conversion model is constructed, the password conversion is a process of generating new passwords by changing the input password once or for many times through programmable commands, common password conversion commands are defined in advance, the rules can be directly called in the formulation process, the password rule command conversion function is realized according to the password conversion model, each rule command corresponds to one logic module, a multi-level pipeline is used for realizing a plurality of rule command continuous conversion functions, the logic of circuit design can be simplified, the complex functions can be realized, and the running frequency of the circuit is improved.
The invention effectively reduces the huge difference between the password transmission speed and the calculation speed by using the rule transformation; under the condition of the same calculated amount, the bandwidth occupied by password input is greatly reduced, and the communication pressure in the working process of the chip can be effectively relieved; meanwhile, the flexibility of the password dictionary is improved, and the success rate of password decoding can be obviously improved.
In addition, the flow making method in the S1 comprises the following steps:
s1.1, inputting the number of rules, and storing the input rules;
s1.2, inputting an initial password, and changing the password according to an input rule;
s1.3, judging whether the password is processed or not, and generating a conversion password after the initial password is processed;
and S1.4, judging whether the rule is changed completely, forming a new rule after the rule is changed completely, and changing the initial password according to the new rule.
When the method is used specifically, firstly, the number of rules is set, initial passwords are input, a rule change is carried out on each initial password, then whether the password is processed or not is judged, after the password is processed, a new password is output, then the rules are changed, and the rules are changed on the initial passwords until all the passwords complete all the rule changes.
Further, the storage method for storing the password transformation rule in S2 is as follows:
s2.1, making a corresponding rule;
and S2.2, the chip formulates a corresponding register for storing a corresponding rule.
When the intelligent password input device is used specifically, the input rules are specially stored in the register in the chip, and the rules are used for password conversion and can be updated at any time according to the scheduling requirement, so that the flexibility requirement is met; all passwords can be kept unchanged before processing is completed, and the requirement for reducing password transmission bandwidth is met.
Still further, the step of S3 constructing the password transformation model is as follows:
s3.1, defining a password transformation command;
and S3.2, combining the password transformation command to generate a new rule.
The password transformation is a process of generating a new password by changing an input password once or for many times through a programmable command, a group of commonly used and good-effect password transformation commands are defined by combining practical experience, the commonly used password transformation commands are stored, a rule can be directly called by only inputting a single password transformation command or a plurality of password transformation commands in the programming process at the later stage, in order to realize more complex rule transformation, a plurality of commands form a rule, all commands are sequentially executed in the executing process, and finally a transformation result is output, such as a command: the $ a $ b $ c $ d $ e realizes the function of converting the additional character "abcde" after the password is input, and the model can realize complex rule conversion due to the flexible and various combination of command quantity and rules.
Specifically, the step of defining the password transformation command definition rule in S3.1 is as follows:
s3.1.1, naming the command for interface conversion;
s3.1.2, formulating a corresponding password conversion command format;
s3.1.3, making a corresponding input password;
and S3.1.4, formulating a corresponding output password.
In the process of defining the password transformation command, firstly, distinguishing each password transformation command, establishing a corresponding password transformation command format for the password transformation command, matching each password transformation command with one password transformation command format, inputting the password transformation command format to call the matched password transformation command, then determining an input password and an output password according to the password transformation command, and storing and calling.
In addition, the implementation method for implementing the password rule command transformation function according to the password transformation model in the S4 comprises the following steps:
s4.1, determining a corresponding logic module according to each rule;
s4.2, storing the input password and the output password into a register, and storing the rule into another register;
and S4.3, determining the upper limit of the number of the commands supported by each rule according to the requirement.
In ASIC design, each rule command corresponds to a logic module, and an input password and an output password are stored in a register; the rules are stored in a set of registers, and the upper limit of the number of commands supported by each rule is determined as needed.
Further, the logic modules in S4.1 include command selection logic, password end additional character logic, password end character deletion logic, password first insertion character logic, password first character deletion logic, letter case change logic, designated character replacement logic, and password integral repetition logic. Wherein:
command selection logic: selecting a corresponding logic module according to the command (: [ ] ^ ultsd) by using a multiplexer (1 in 10);
password tail additional character logic: shifting the character to be appended (using a shift register) according to the length of the input password, then using a logic OR gate to realize that a specified character is appended to the data tail, and discarding the tail character when the result length reaches the upper limit;
delete password tail character logic: according to the length of the input password, deleting the tail characters of the decoration data by using a logic AND gate;
password prefix insertion character logic: using a shift register to realize the insertion of characters at the head of the password, and discarding the last character when the result length exceeds the limit;
delete password first character logic: implementing a delete password first character command using a shift register;
alternate letter case logic: for each input character, firstly judging whether the character is a Latin letter, and then carrying out case change according to a command;
replace designated character logic: judging whether each input character is a character needing to be replaced, if so, replacing the character with a new character, and using a comparator and a selector;
password ensemble repetition logic: the use of shift registers and logical OR gates enables the overall repetition of the password, discarding the extra characters when the result length exceeds a limit.
The password transformation command comparison is shown in the following table:
command | Format | Example | Entering a password | Outputting a password |
Keeping passwords unchanged | : | : | Abc1#Db | Abc1#Db |
Additional characters at the end of password | $ character | $a | Abc1#Db | Abc1#Dba |
Deleting password tail characters | ] | ] | Abc1#Db | Abc1#D |
Password prefix insertion character | Lambda character | Lambda character | Abc1#Db | aAbc1#Db |
Deleting the first character of the password | [ | [ | Abc1#Db | bc1#Db |
All letters become large | u | u | Abc1#Db | ABC1#DB |
All letters become small | l | l | Abc1#Db | abc1#db |
All letter case interconversion | t | t | Abc1#Db | aBC1#dB |
Replacing designated characters | s old character new character | sbX | Abc1#Db | AXc1#DX |
Password ensemble repetition | d | d | Abc1#DbAbc1#DbAbc1#Db |
Password transformation command comparison table
Still further, the step of the rule command continuous transformation method in S5 is as follows:
s5.1, determining rule transformation quantity according to a command combination mode;
and S5.2, removing the rules with poor effects according to the instruction use effect, and adding new rules.
After the pipeline is full, a new password can be generated in each clock cycle, at least 300 clock cycles are needed for inputting a password externally, in order to realize more complicated rule transformation, a multi-stage pipeline is used in ASIC password rule transformation design, each stage of pipeline can execute a rule command, when a 6-stage pipeline is used, 6 commands can be executed, namely each rule is formed by combining 6 commands at most, in the method, 6 command combinations are provided, 10 commands are provided, wherein the insertion and replacement commands imply more transformation conditions (different characters are inserted, and the combination of the replaced and replaced characters), and the implemented password transformation rule exceeds 2 78 And the input rules are programmable, so that new rules can be continuously added and the rules with poor effect can be deleted in the application process, and the method is convenient and flexible.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and the preferred embodiments of the present invention are described in the above embodiments and the description, and are not intended to limit the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (6)
1. A method for implementing password transformation on an ASIC chip, comprising the steps of:
s1, formulating a password change overall process;
s2, storing password transformation rules;
s3, constructing a password transformation model;
s4, realizing a password rule command conversion function according to a password conversion model;
s5, a multi-stage assembly line is used for realizing a continuous conversion function of a plurality of rule commands;
the process making method in the S1 comprises the following steps:
s1.1, inputting the number of rules, and storing the input rules;
s1.2, inputting an initial password, and changing the password according to an input rule;
s1.3, judging whether the password is processed or not, and generating a conversion password after the initial password is processed;
s1.4, judging whether the rule is changed completely, forming a new rule after the change is completed, and changing the initial password according to the new rule;
the storage method for storing the password transformation rule in the S2 comprises the following steps:
s2.1, making a corresponding rule;
and S2.2, the chip formulates a corresponding register for storing a corresponding rule.
2. The method of implementing password transformation on an ASIC chip of claim 1, wherein: the S3 password transformation model construction method comprises the following steps:
s3.1, defining a password transformation command;
and S3.2, combining the password transformation command to generate a new rule.
3. The method for implementing password transformation on ASIC chip of claim 2, wherein: the step of defining the password transformation command definition rule in the S3.1 comprises the following steps:
s3.1.1, naming the command for interface conversion;
s3.1.2, formulating a corresponding password conversion command format;
s3.1.3, making a corresponding input password;
and S3.1.4, formulating a corresponding output password.
4. The method of implementing password transformation on an ASIC chip of claim 1, wherein: the implementation method for implementing the command conversion function of the password rule according to the password conversion model in the S4 comprises the following steps:
s4.1, determining a corresponding logic module according to each rule;
s4.2, storing the input password and the output password to a register, and storing the rule to another register;
and S4.3, determining the upper limit of the number of the commands supported by each rule according to the requirement.
5. The method of implementing password transformation on ASIC chip of claim 4, wherein: the logic modules in the S4.1 comprise command selection logic, password tail additional character logic, password tail character deletion logic, password head character insertion logic, password first character deletion logic, letter case changing logic, designated character replacement logic and password integral repetition logic.
6. The method for implementing password transformation on ASIC chip of claim 1, wherein: the method for continuously transforming the rule command in the S5 comprises the following steps:
s5.1, determining rule transformation quantity according to a command combination mode;
and S5.2, removing the rules with poor effects according to the instruction use effect, and adding new rules.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310111788.2A CN115941179B (en) | 2023-02-14 | 2023-02-14 | Method for realizing password conversion on ASIC chip |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310111788.2A CN115941179B (en) | 2023-02-14 | 2023-02-14 | Method for realizing password conversion on ASIC chip |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115941179A true CN115941179A (en) | 2023-04-07 |
CN115941179B CN115941179B (en) | 2023-05-16 |
Family
ID=85820286
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310111788.2A Active CN115941179B (en) | 2023-02-14 | 2023-02-14 | Method for realizing password conversion on ASIC chip |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115941179B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6397337B1 (en) * | 1998-04-30 | 2002-05-28 | Compaq Computer Corporation | Unified password prompt of a computer system |
US20050139658A1 (en) * | 2003-12-29 | 2005-06-30 | Bruno Lambert | Enhanced PIN and password protection system and method |
CN101102192A (en) * | 2007-07-18 | 2008-01-09 | 北京飞天诚信科技有限公司 | Authentication device, method and system |
CN106559222A (en) * | 2016-11-28 | 2017-04-05 | 广东省信息安全测评中心 | Target password rule set acquisition methods and system in method of exhaustion decryption |
CN107154851A (en) * | 2017-06-30 | 2017-09-12 | 上海众人网络安全技术有限公司 | A kind of method and device of data encryption and decryption |
CN111786796A (en) * | 2020-07-02 | 2020-10-16 | 南开大学 | Password strength evaluation method based on password reuse, character jump and separation |
CN112016083A (en) * | 2020-10-30 | 2020-12-01 | 之江实验室 | Password transformation rule induction method based on intelligent clustering |
CN115114613A (en) * | 2022-08-26 | 2022-09-27 | 大有信创(北京)科技有限公司 | System for password cracking by using ASIC and GPU heterogeneous type resources |
CN115242450A (en) * | 2022-06-23 | 2022-10-25 | 北卡科技有限公司 | Password data input method, device and storage medium |
-
2023
- 2023-02-14 CN CN202310111788.2A patent/CN115941179B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6397337B1 (en) * | 1998-04-30 | 2002-05-28 | Compaq Computer Corporation | Unified password prompt of a computer system |
US20050139658A1 (en) * | 2003-12-29 | 2005-06-30 | Bruno Lambert | Enhanced PIN and password protection system and method |
CN101102192A (en) * | 2007-07-18 | 2008-01-09 | 北京飞天诚信科技有限公司 | Authentication device, method and system |
CN106559222A (en) * | 2016-11-28 | 2017-04-05 | 广东省信息安全测评中心 | Target password rule set acquisition methods and system in method of exhaustion decryption |
CN107154851A (en) * | 2017-06-30 | 2017-09-12 | 上海众人网络安全技术有限公司 | A kind of method and device of data encryption and decryption |
CN111786796A (en) * | 2020-07-02 | 2020-10-16 | 南开大学 | Password strength evaluation method based on password reuse, character jump and separation |
CN112016083A (en) * | 2020-10-30 | 2020-12-01 | 之江实验室 | Password transformation rule induction method based on intelligent clustering |
CN115242450A (en) * | 2022-06-23 | 2022-10-25 | 北卡科技有限公司 | Password data input method, device and storage medium |
CN115114613A (en) * | 2022-08-26 | 2022-09-27 | 大有信创(北京)科技有限公司 | System for password cracking by using ASIC and GPU heterogeneous type resources |
Non-Patent Citations (1)
Title |
---|
马刚勇;权建校;韩文报;: "安全口令生成器的设计与实现", 信息安全与通信保密 * |
Also Published As
Publication number | Publication date |
---|---|
CN115941179B (en) | 2023-05-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105207678B (en) | A kind of system for implementing hardware of modified LZ4 compression algorithms | |
CN101164340A (en) | CABAC decoding system and method | |
CN105791828B (en) | Binary arithmetic coder and its coding method | |
CN104038232B (en) | Testing data compression and decompression method based on secondary exclusive-or operation | |
CN108391129B (en) | Data-encoding scheme and device | |
US5617089A (en) | Huffman code decoding circuit | |
CN110868223B (en) | Numerical operation implementation method and circuit for Huffman coding | |
CA1286732C (en) | Rank-order filter | |
CN115018062A (en) | Convolutional neural network accelerator based on FPGA | |
CN110022188A (en) | Interpretation method and circuit are serially offset based on the polarization code encoding method and polarization code for freezing bit pair | |
CN107565974B (en) | Static Huffman parallel full coding implementation method | |
CN115941179A (en) | Method for realizing password conversion on ASIC chip | |
Bowen et al. | Bounds on classical information capacities for a class of quantum memory channels | |
CN108647780B (en) | Reconfigurable pooling operation module structure facing neural network and implementation method thereof | |
CN112199214A (en) | Candidate password generation and application cracking method on GPU | |
CN116934487B (en) | Financial clearing data optimal storage method and system | |
CN111384972A (en) | Optimization method and device of multi-system LDPC decoding algorithm and decoder | |
JP2022048930A (en) | Data compression method, data compression device, data compression program, data decompression method, data decompression device, and data decompression program | |
CN106253910A (en) | A kind of compaction coding method | |
CN115865098A (en) | Data compression method based on Huffman coding | |
CN115913246A (en) | Lossless data compression algorithm based on self-adaptive instantaneous entropy | |
CN111160544B (en) | Data activation method and FPGA data activation system | |
CN117371498A (en) | Data processing method, multiply accumulator, computing architecture, device and storage medium | |
Gray et al. | Ergodicity of Markov channels | |
CN100426219C (en) | Data operating method and apparatus in integrated circuit |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: A Method for Implementing Password Transformation on ASIC Chips Effective date of registration: 20231008 Granted publication date: 20230516 Pledgee: Ji'nan finance Company limited by guarantee Pledgor: Shandong Rongan Intelligent Technology Co.,Ltd. Registration number: Y2023980060284 |