咨询与建议

限定检索结果

文献类型

  • 15 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 12 篇 计算机科学与技术...
    • 7 篇 电气工程
    • 4 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 电子科学与技术(可...
  • 1 篇 理学
    • 1 篇 物理学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 18 篇 aes encryption a...
  • 2 篇 deep learning
  • 2 篇 profiling sca
  • 2 篇 side channel ana...
  • 2 篇 hiding-based aes...
  • 2 篇 non-profiling sc...
  • 1 篇 chaotic cryptogr...
  • 1 篇 clustering
  • 1 篇 prime protocol
  • 1 篇 three-valued enc...
  • 1 篇 matlab
  • 1 篇 variable latency...
  • 1 篇 side channel att...
  • 1 篇 asic
  • 1 篇 image encryption
  • 1 篇 dpa attacks
  • 1 篇 cyber stalking
  • 1 篇 simplified templ...
  • 1 篇 differential pow...
  • 1 篇 ternary optical ...

机构

  • 1 篇 state grid elect...
  • 1 篇 harbin inst tech...
  • 1 篇 guru gobind sing...
  • 1 篇 heilongjiang uni...
  • 1 篇 psr rengasamy co...
  • 1 篇 univ grenoble al...
  • 1 篇 uestc res inst e...
  • 1 篇 inner mongolia u...
  • 1 篇 jiangxi tech col...
  • 1 篇 school of comput...
  • 1 篇 psr rengasamy co...
  • 1 篇 fu jen catholic ...
  • 1 篇 state grid jiang...
  • 1 篇 state grid jiang...
  • 1 篇 tianjin univ sci...
  • 1 篇 east china jiaot...
  • 1 篇 department of el...
  • 1 篇 jiaxing univ sch...
  • 1 篇 china univ min &...
  • 1 篇 bb ambedkar univ...

作者

  • 1 篇 yang bin
  • 1 篇 david hély
  • 1 篇 zhang jiarui
  • 1 篇 lin kuan jen
  • 1 篇 ke ting
  • 1 篇 sixiang wang
  • 1 篇 kang shi-jun
  • 1 篇 weng chih ping
  • 1 篇 guo xu
  • 1 篇 aerabi ehsan
  • 1 篇 amir alipour
  • 1 篇 beroulle vincent
  • 1 篇 zhang chuanlei
  • 1 篇 athanasios papad...
  • 1 篇 chaudhary priyan...
  • 1 篇 ghavami behnam
  • 1 篇 song kai
  • 1 篇 jain ishu
  • 1 篇 qi cui
  • 1 篇 chen pengfei

语言

  • 17 篇 英文
检索条件"主题词=AES Encryption Algorithm"
18 条 记 录,以下是11-20 订阅
排序:
Chaos encryption algorithm Based on Kent Mapping and aes Combination
Chaos Encryption Algorithm Based on Kent Mapping and AES Com...
收藏 引用
2018 International Conference on Network, Communication, Computer Engineering (NCCE 2018)
作者: Yong Wang Shuo Chen Ying Wang School of computers Guangdong University of Technology
Aiming at the application of a class of image encryption algorithm based on chaotic system,a chaotic image encryption algorithm based on Kent mapping and aes(Advanced encryption Standard) encryption algorithm is ***,a... 详细信息
来源: 评论
Improvement of PRIME Protocol Based on Chaotic Cryptography  22
Improvement of PRIME Protocol Based on Chaotic Cryptography
收藏 引用
22nd International Conference on Electrical Machines and Systems (ICEMS)
作者: Chen, Pengfei Liu, Xiaosheng Zhang, Jiarui Yu, Chunjiao Pu, Honghong Yao, Yousu Harbin Inst Technol Sch Elect Engn Harbin Peoples R China
PRIME protocol is a narrowband power line communication protocol whose security is based on Advanced encryption Standard. However, the key expansion process of aes algorithm is not unidirectional, and each round of ke... 详细信息
来源: 评论
A Video encryption Service Based on Cloud Computing  7
A Video Encryption Service Based on Cloud Computing
收藏 引用
7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)
作者: Pei, Dong Guo, Xu Zhang, Junxing Inner Mongolia Univ Coll Comp Sci Hohhot Peoples R China
With the popularization of the network in recent years, the application of video broadcast system, video conference system, video Surveillance System and other aspects of the application have put forward higher requir... 详细信息
来源: 评论
Two Kinds of Correlation Analysis Method Attack on Implementations of Advanced encryption Standard Software Running Inside STC89C52 Microprocessor  2
Two Kinds of Correlation Analysis Method Attack on Implement...
收藏 引用
2nd IEEE International Conference on Computer and Communications (ICCC)
作者: He Fei Gao Daheng UESTC Res Inst Elect Sci & Technol Chengdu Sichuan Peoples R China
With the development of IC technology, many electronic devices are used the encryption module which is implemented by embedded system to protect sensitive data to ensure communication security. In this paper, we focus... 详细信息
来源: 评论
A Calculation Simplified DPA Attack based on Reduced Template
A Calculation Simplified DPA Attack based on Reduced Templat...
收藏 引用
2016 IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference(IMCEC 2016)
作者: Xiaoyi Duan Qi Cui Sixiang Wang Dongxu Li Kewang Sun Xianwei Gao Department of Electronics and Information Engineering Beijing Electronic Science and Technology Institute
In a traditional template attack,during the template building phase,a large amount of calculation is usually needed,or,what is worse,some impossible calculation might be occurred to get the covariance *** a deep resea... 详细信息
来源: 评论
Using K-Means Clustering algorithm for Handling Data Precision
Using K-Means Clustering Algorithm for Handling Data Precisi...
收藏 引用
International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE)
作者: Suganthi, P. Kala, K. Balasubramanian, C. PSR Rengasamy Coll Engn Women Dept CSE Sivakasi Tamil Nadu India PSR Rengasamy Coll Engn Women CSE Sivakasi Tamil Nadu India
The sensitive data are patient record details, organization record which are handled only administrative member. Preservation of privacy is a major feature of data mining and individual's privacy without losing of... 详细信息
来源: 评论
CAVEAT: Credit Card Vulnerability Exhibition and Authentication Tool  2
CAVEAT: Credit Card Vulnerability Exhibition and Authenticat...
收藏 引用
2nd International Symposium on Security in Computing and Communications (SSCC)
作者: Jain, Ishu Johari, Rahul Ujjwal, R. L. Guru Gobind Singh Indraprastha Univ USICT Delhi India
Online banking (or Internet baking or E-banking) makes people capable to do financial transactions on a secured website. It allows users to manage their money without going to their respective banks. Today, the users ... 详细信息
来源: 评论
Exploiting Temporal-Jitter to Counteract DPA Attacks in Variable-Latency Pipelines
Exploiting Temporal-Jitter to Counteract DPA Attacks in Vari...
收藏 引用
54th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS)
作者: Lin, Kuan Jen Weng, Chih Ping Fu Jen Catholic Univ Dept Elect Engn Taipei Taiwan
Cryptographic systems are vulnerable to Differential Power Analysis (DPA) attacks. Making the time instant of executing certain operation unpredictable is an efficient way to counteract DPA attacks. The variation of t... 详细信息
来源: 评论