咨询与建议

限定检索结果

文献类型

  • 15 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 12 篇 计算机科学与技术...
    • 7 篇 电气工程
    • 4 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 电子科学与技术(可...
  • 1 篇 理学
    • 1 篇 物理学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 18 篇 aes encryption a...
  • 2 篇 deep learning
  • 2 篇 profiling sca
  • 2 篇 side channel ana...
  • 2 篇 hiding-based aes...
  • 2 篇 non-profiling sc...
  • 1 篇 chaotic cryptogr...
  • 1 篇 clustering
  • 1 篇 prime protocol
  • 1 篇 three-valued enc...
  • 1 篇 matlab
  • 1 篇 variable latency...
  • 1 篇 side channel att...
  • 1 篇 asic
  • 1 篇 image encryption
  • 1 篇 dpa attacks
  • 1 篇 cyber stalking
  • 1 篇 simplified templ...
  • 1 篇 differential pow...
  • 1 篇 ternary optical ...

机构

  • 1 篇 state grid elect...
  • 1 篇 harbin inst tech...
  • 1 篇 guru gobind sing...
  • 1 篇 heilongjiang uni...
  • 1 篇 psr rengasamy co...
  • 1 篇 univ grenoble al...
  • 1 篇 uestc res inst e...
  • 1 篇 inner mongolia u...
  • 1 篇 jiangxi tech col...
  • 1 篇 school of comput...
  • 1 篇 psr rengasamy co...
  • 1 篇 fu jen catholic ...
  • 1 篇 state grid jiang...
  • 1 篇 state grid jiang...
  • 1 篇 tianjin univ sci...
  • 1 篇 east china jiaot...
  • 1 篇 department of el...
  • 1 篇 jiaxing univ sch...
  • 1 篇 china univ min &...
  • 1 篇 bb ambedkar univ...

作者

  • 1 篇 yang bin
  • 1 篇 david hély
  • 1 篇 zhang jiarui
  • 1 篇 lin kuan jen
  • 1 篇 ke ting
  • 1 篇 sixiang wang
  • 1 篇 kang shi-jun
  • 1 篇 weng chih ping
  • 1 篇 guo xu
  • 1 篇 aerabi ehsan
  • 1 篇 amir alipour
  • 1 篇 beroulle vincent
  • 1 篇 zhang chuanlei
  • 1 篇 athanasios papad...
  • 1 篇 chaudhary priyan...
  • 1 篇 ghavami behnam
  • 1 篇 song kai
  • 1 篇 jain ishu
  • 1 篇 qi cui
  • 1 篇 chen pengfei

语言

  • 17 篇 英文
检索条件"主题词=AES encryption algorithm"
18 条 记 录,以下是1-10 订阅
排序:
Research on parallel aes encryption algorithm based on a ternary optical computer
收藏 引用
OPTICS COMMUNICATIONS 2025年 583卷
作者: Song, Kai Liu, Shuzhe Wang, Hejie Yang, Sheng Yan, Liping Zhang, Sulan East China Jiaotong Univ Sch Informat & Software Engn Shuanggang Rd Nanchang 330013 Peoples R China Jiaxing Univ Sch Artificial Intelligence Jiaxing 314001 Zhejiang Peoples R China
The Advanced encryption Standard (aes) encryption algorithm has never been broken since its introduction, and its security has been widely recognized and adopted widely by numerous countries and organizations. However... 详细信息
来源: 评论
On the Performance of Non-Profiled Differential Deep Learning Attacks against an aes encryption algorithm Protected using a Correlated Noise Generation based Hiding Countermeasure
On the Performance of Non-Profiled Differential Deep Learnin...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition (DATE)
作者: Alipour, Amir Papadimitriou, Athanasios Beroulle, Vincent Aerabi, Ehsan Hely, David Univ Grenoble Alpes Grenoble INP LCIS F-26000 Valence France
Recent works in the field of cryptography focus on Deep Learning based Side Channel Analysis (DLSCA) as one of the most powerful attacks against common encryption algorithms such as aes. As a common case, profiling DL... 详细信息
来源: 评论
On the performance of non-profiled differential deep learning attacks against an aes encryption algorithm protected using a correlated noise generation based hiding countermeasure  20
On the performance of non-profiled differential deep learnin...
收藏 引用
Proceedings of the 23rd Conference on Design, Automation and Test in Europe
作者: Amir Alipour Athanasios Papadimitriou Vincent Beroulle Ehsan Aerabi David Hély Univ. Grenoble Alpes Valence France
Recent works in the field of cryptography focus on Deep Learning based Side Channel Analysis (DLSCA) as one of the most powerful attacks against common encryption algorithms such as aes. As a common case, profiling DL... 详细信息
来源: 评论
Password Security Using Bcrypt with aes encryption algorithm  1st
Password Security Using Bcrypt with AES Encryption Algorithm
收藏 引用
1st International Conference on Smart Computing and Informatics (SCI)
作者: Kumar, Narander Chaudhary, Priyanka BB Ambedkar Univ Dept Comp Sci Lucknow Uttar Pradesh India
With the advancement of technology, the Internet has become a widely used tool of communication. Million numbers of individual all over in the world can get the utilization of technology. Novel issues like cyber stalk... 详细信息
来源: 评论
An Improved aes encryption algorithm Based on Chaos Theory in Wireless Communication Networks  3
An Improved AES Encryption Algorithm Based on Chaos Theory i...
收藏 引用
International Conference on Robot Vision and Signal Processing
作者: Yang, Zi-Heng Li, Ao-Han Yu, Ling-Ling Kang, Shi-Jun Han, Meng-Jiang Ding, Qun Heilongjiang Univ Sch Elect Engn Harbin 150080 Heilongjiang Peoples R China
for ensuring the security of the information transmission, safe encryption algorithms are needed to encrypt information in wireless communication networks. Currently, one relative common encryption algorithm is aes en... 详细信息
来源: 评论
An image encryption method based on chaos system and aes algorithm
收藏 引用
JOURNAL OF SUPERCOMPUTING 2019年 第10期75卷 6663-6682页
作者: Arab, Alireza Rostami, Mohammad Javad Ghavami, Behnam Shahid Bahonar Univ Kerman Kerman Iran
In this paper, a novel image encryption algorithm is proposed based on the combination of the chaos sequence and the modified aes algorithm. In this method, the encryption key is generated by Arnold chaos sequence. Th... 详细信息
来源: 评论
aes Improvement algorithm Based on the Chaotic System in IIOT  20th
AES Improvement Algorithm Based on the Chaotic System in IIO...
收藏 引用
20th International Conference on Intelligent Computing (ICIC)
作者: Li, Jianrong Xu, Zhiqiang Han, Pengyu Sun, Huiying Ke, Ting Chen, Wei Zhang, Chuanlei Tianjin Univ Sci & Technol Tianjin Peoples R China China Univ Min & Technol Beijing Peoples R China
In the rapidly evolving Industrial Internet of Things (IIoT), security is a key concern. The traditional aes algorithm has limitations on key generation and attack resistance in IIoT's resource-limited and complex... 详细信息
来源: 评论
Construction and Application of Blockchain Technology in Certification Platform for Vocational Core Competencies of Students of Higher Vocational Education of Engineering  24
Construction and Application of Blockchain Technology in Cer...
收藏 引用
International Conference on Machine Intelligence and Digital Applications (MIDA)
作者: Zhang, Zhidi Jilin Commun Polytech Changchun 130015 Jilin Peoples R China
Currently, blockchain technology has been applied in various industries. Chinese Government has emphasized the important role and core position of blockchain technology on several formal occasions, elevating it to a n... 详细信息
来源: 评论
Application of optimizing advanced encryption standard encryption algorithm in secure communication of vehicle controller area network bus
收藏 引用
FRONTIERS IN MECHANICAL ENGINEERING-SWITZERLAND 2024年 10卷
作者: Mu, Chenzhe Jiangxi Tech Coll Mfg Sch Mech Engn Nanchang Peoples R China
Introduction: As the main means of information exchange within vehicles, the safety of the controller area network bus directly affects the safe operation of the vehicle and the safety of passengers' lives and ***... 详细信息
来源: 评论
Research on Information Security Protection Technology of Client Side System
Research on Information Security Protection Technology of Cl...
收藏 引用
Chinese Automation Congress (CAC)
作者: Yang, Bin Shao, Xuesong Zheng, Hongjuan Gu, Linlin Sun, Jize State Grid JiangSu Elect Power Co Ltd Nanjing 210000 Peoples R China State Grid JiangSu Mkt Serv Ctr Nanjing 210019 Peoples R China State Grid Elect Power Res Inst Co Ltd Nanjing 211106 Peoples R China
In order to improve the security protection of the customer-side energy use control system for data collection and monitoring, demand response, and energy efficiency improvement, it is urgent to further develop and im... 详细信息
来源: 评论