咨询与建议

限定检索结果

文献类型

  • 15 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 12 篇 计算机科学与技术...
    • 7 篇 电气工程
    • 4 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 电子科学与技术(可...
  • 1 篇 理学
    • 1 篇 物理学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 18 篇 aes encryption a...
  • 2 篇 deep learning
  • 2 篇 profiling sca
  • 2 篇 side channel ana...
  • 2 篇 hiding-based aes...
  • 2 篇 non-profiling sc...
  • 1 篇 chaotic cryptogr...
  • 1 篇 clustering
  • 1 篇 prime protocol
  • 1 篇 three-valued enc...
  • 1 篇 matlab
  • 1 篇 variable latency...
  • 1 篇 side channel att...
  • 1 篇 asic
  • 1 篇 image encryption
  • 1 篇 dpa attacks
  • 1 篇 cyber stalking
  • 1 篇 simplified templ...
  • 1 篇 differential pow...
  • 1 篇 ternary optical ...

机构

  • 1 篇 state grid elect...
  • 1 篇 harbin inst tech...
  • 1 篇 guru gobind sing...
  • 1 篇 heilongjiang uni...
  • 1 篇 psr rengasamy co...
  • 1 篇 univ grenoble al...
  • 1 篇 uestc res inst e...
  • 1 篇 inner mongolia u...
  • 1 篇 jiangxi tech col...
  • 1 篇 school of comput...
  • 1 篇 psr rengasamy co...
  • 1 篇 fu jen catholic ...
  • 1 篇 state grid jiang...
  • 1 篇 state grid jiang...
  • 1 篇 tianjin univ sci...
  • 1 篇 east china jiaot...
  • 1 篇 department of el...
  • 1 篇 jiaxing univ sch...
  • 1 篇 china univ min &...
  • 1 篇 bb ambedkar univ...

作者

  • 1 篇 yang bin
  • 1 篇 david hély
  • 1 篇 zhang jiarui
  • 1 篇 lin kuan jen
  • 1 篇 ke ting
  • 1 篇 sixiang wang
  • 1 篇 kang shi-jun
  • 1 篇 weng chih ping
  • 1 篇 guo xu
  • 1 篇 aerabi ehsan
  • 1 篇 amir alipour
  • 1 篇 beroulle vincent
  • 1 篇 zhang chuanlei
  • 1 篇 athanasios papad...
  • 1 篇 chaudhary priyan...
  • 1 篇 ghavami behnam
  • 1 篇 song kai
  • 1 篇 jain ishu
  • 1 篇 qi cui
  • 1 篇 chen pengfei

语言

  • 18 篇 英文
  • 1 篇 德文
  • 1 篇 法文
检索条件"主题词=AES encryption algorithm"
18 条 记 录,以下是1-10 订阅
排序:
Research on parallel aes encryption algorithm based on a ternary optical computer
收藏 引用
OPTICS COMMUNICATIONS 2025年 583卷
作者: Song, Kai Liu, Shuzhe Wang, Hejie Yang, Sheng Yan, Liping Zhang, Sulan East China Jiaotong Univ Sch Informat & Software Engn Shuanggang Rd Nanchang 330013 Peoples R China Jiaxing Univ Sch Artificial Intelligence Jiaxing 314001 Zhejiang Peoples R China
The Advanced encryption Standard (aes) encryption algorithm has never been broken since its introduction, and its security has been widely recognized and adopted widely by numerous countries and organizations. However... 详细信息
来源: 评论
On the Performance of Non-Profiled Differential Deep Learning Attacks against an aes encryption algorithm Protected using a Correlated Noise Generation based Hiding Countermeasure
On the Performance of Non-Profiled Differential Deep Learnin...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition (DATE)
作者: Alipour, Amir Papadimitriou, Athanasios Beroulle, Vincent Aerabi, Ehsan Hely, David Univ Grenoble Alpes Grenoble INP LCIS F-26000 Valence France
Recent works in the field of cryptography focus on Deep Learning based Side Channel Analysis (DLSCA) as one of the most powerful attacks against common encryption algorithms such as aes. As a common case, profiling DL... 详细信息
来源: 评论
An Improved aes encryption algorithm Based on Chaos Theory in Wireless Communication Networks  3
An Improved AES Encryption Algorithm Based on Chaos Theory i...
收藏 引用
International Conference on Robot Vision and Signal Processing
作者: Yang, Zi-Heng Li, Ao-Han Yu, Ling-Ling Kang, Shi-Jun Han, Meng-Jiang Ding, Qun Heilongjiang Univ Sch Elect Engn Harbin 150080 Heilongjiang Peoples R China
for ensuring the security of the information transmission, safe encryption algorithms are needed to encrypt information in wireless communication networks. Currently, one relative common encryption algorithm is aes en... 详细信息
来源: 评论
Password Security Using Bcrypt with aes encryption algorithm  1st
Password Security Using Bcrypt with AES Encryption Algorithm
收藏 引用
1st International Conference on Smart Computing and Informatics (SCI)
作者: Kumar, Narander Chaudhary, Priyanka BB Ambedkar Univ Dept Comp Sci Lucknow Uttar Pradesh India
With the advancement of technology, the Internet has become a widely used tool of communication. Million numbers of individual all over in the world can get the utilization of technology. Novel issues like cyber stalk... 详细信息
来源: 评论
On the performance of non-profiled differential deep learning attacks against an aes encryption algorithm protected using a correlated noise generation based hiding countermeasure  20
On the performance of non-profiled differential deep learnin...
收藏 引用
Proceedings of the 23rd Conference on Design, Automation and Test in Europe
作者: Amir Alipour Athanasios Papadimitriou Vincent Beroulle Ehsan Aerabi David Hély Univ. Grenoble Alpes Valence France
Recent works in the field of cryptography focus on Deep Learning based Side Channel Analysis (DLSCA) as one of the most powerful attacks against common encryption algorithms such as aes. As a common case, profiling DL... 详细信息
来源: 评论
An image encryption method based on chaos system and aes algorithm
收藏 引用
JOURNAL OF SUPERCOMPUTING 2019年 第10期75卷 6663-6682页
作者: Arab, Alireza Rostami, Mohammad Javad Ghavami, Behnam Shahid Bahonar Univ Kerman Kerman Iran
In this paper, a novel image encryption algorithm is proposed based on the combination of the chaos sequence and the modified aes algorithm. In this method, the encryption key is generated by Arnold chaos sequence. Th... 详细信息
来源: 评论
Chaos encryption algorithm Based on Kent Mapping and aes Combination
Chaos Encryption Algorithm Based on Kent Mapping and AES Com...
收藏 引用
2018 International Conference on Network, Communication, Computer Engineering (NCCE 2018)
作者: Yong Wang Shuo Chen Ying Wang School of computers Guangdong University of Technology
Aiming at the application of a class of image encryption algorithm based on chaotic system,a chaotic image encryption algorithm based on Kent mapping and aes(Advanced encryption Standard) encryption algorithm is ***,a... 详细信息
来源: 评论
A Video encryption Service Based on Cloud Computing  7
A Video Encryption Service Based on Cloud Computing
收藏 引用
7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)
作者: Pei, Dong Guo, Xu Zhang, Junxing Inner Mongolia Univ Coll Comp Sci Hohhot Peoples R China
With the popularization of the network in recent years, the application of video broadcast system, video conference system, video Surveillance System and other aspects of the application have put forward higher requir... 详细信息
来源: 评论
Two Kinds of Correlation Analysis Method Attack on Implementations of Advanced encryption Standard Software Running Inside STC89C52 Microprocessor  2
Two Kinds of Correlation Analysis Method Attack on Implement...
收藏 引用
2nd IEEE International Conference on Computer and Communications (ICCC)
作者: He Fei Gao Daheng UESTC Res Inst Elect Sci & Technol Chengdu Sichuan Peoples R China
With the development of IC technology, many electronic devices are used the encryption module which is implemented by embedded system to protect sensitive data to ensure communication security. In this paper, we focus... 详细信息
来源: 评论
Application of optimizing advanced encryption standard encryption algorithm in secure communication of vehicle controller area network bus
收藏 引用
FRONTIERS IN MECHANICAL ENGINEERING-SWITZERLAND 2024年 10卷
作者: Mu, Chenzhe Jiangxi Tech Coll Mfg Sch Mech Engn Nanchang Peoples R China
Introduction: As the main means of information exchange within vehicles, the safety of the controller area network bus directly affects the safe operation of the vehicle and the safety of passengers' lives and ***... 详细信息
来源: 评论