咨询与建议

限定检索结果

文献类型

  • 10 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 8 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 信息与通信工程
    • 3 篇 软件工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 生物医学工程(可授...
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 医学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 18 篇 block cipher alg...
  • 4 篇 cryptography
  • 2 篇 encryption algor...
  • 2 篇 cloud security
  • 2 篇 area cost
  • 2 篇 interconnection ...
  • 2 篇 stream cipher al...
  • 2 篇 coarse-grain rec...
  • 1 篇 high order stati...
  • 1 篇 performance
  • 1 篇 filters
  • 1 篇 reliability
  • 1 篇 internet of thin...
  • 1 篇 vlsi chip
  • 1 篇 joint watermarki...
  • 1 篇 parallelism
  • 1 篇 cmos integrated ...
  • 1 篇 hybrid descast.
  • 1 篇 power analysis a...
  • 1 篇 orthogonal latin...

机构

  • 2 篇 school of microe...
  • 2 篇 department of mi...
  • 1 篇 yonsei univ sch ...
  • 1 篇 inha univ coll i...
  • 1 篇 natl crypto inst...
  • 1 篇 univ coll bahrai...
  • 1 篇 inst telecom f-2...
  • 1 篇 china automot te...
  • 1 篇 college of lnfo....
  • 1 篇 natl inst astrop...
  • 1 篇 research center ...
  • 1 篇 natl crypto inst...
  • 1 篇 heilongjiang uni...
  • 1 篇 university colle...
  • 1 篇 zhoukou normal u...
  • 1 篇 city univ hong k...
  • 1 篇 institut telecom...
  • 1 篇 harbin inst tech...
  • 1 篇 peking univ inst...
  • 1 篇 beijing inst tec...

作者

  • 2 篇 zibin dai
  • 2 篇 wei li
  • 2 篇 longmei nan
  • 2 篇 tongzhou qu
  • 2 篇 anqi yin
  • 1 篇 ismoyo dimas dwi...
  • 1 篇 sengupta nandita
  • 1 篇 wang lei
  • 1 篇 liu y
  • 1 篇 huang yuhua
  • 1 篇 tong xiaojun
  • 1 篇 coatrieux g.
  • 1 篇 chinnasamy ramya
  • 1 篇 jiang ap
  • 1 篇 sheng sm
  • 1 篇 yi jaeyoung
  • 1 篇 balderas-contrer...
  • 1 篇 jiang zijing
  • 1 篇 xia xianzhao
  • 1 篇 su yuyue

语言

  • 17 篇 英文
  • 1 篇 中文
检索条件"主题词=Block cipher algorithm"
18 条 记 录,以下是1-10 订阅
排序:
A Sink Node Trusted Access Authentication Protocol for Mobile Wireless Sensor Network Using block cipher algorithm Based on IoT
收藏 引用
INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS 2020年 第2期27卷 234-240页
作者: Wang, Qian Chen, Wenxia Wang, Lei Zhoukou Normal Univ Coll Comp Sci & Technol Zhoukou 466001 Henan Peoples R China Zhoukou Senior Tech Sch Zhoukou 466001 Henan Peoples R China Soochow Univ Ctr Informat Dev & Management Suzhou 215006 Jiangsu Peoples R China
Aiming at the problem that mobile nodes in Wireless Sensor Network (WSN) lack credibility verification, a Sink node trusted access authentication protocol using packet cipher algorithm for mobile WSN is proposed based... 详细信息
来源: 评论
Fully Pipelined Hardware Implementation of 128-Bit SEED block cipher algorithm
Fully Pipelined Hardware Implementation of 128-Bit SEED Bloc...
收藏 引用
5th International Workshop on Applied Reconfigurable Computing
作者: Yi, Jaeyoung Park, Karam Park, Joonseok Ro, Won W. Yonsei Univ Sch Elect & Elect Engn Seoul 120749 South Korea Inha Univ Coll Informat Technol Seoul South Korea
As the need for information security increases in our everyday life, the job of encoding/decoding for secure information delivery becomes a critical issue in data network systems. High-speed data encoding for cryptogr... 详细信息
来源: 评论
block cipher and Stream cipher algorithm Performance Comparison in a Personal VPN Gateway
Block Cipher and Stream Cipher Algorithm Performance Compari...
收藏 引用
1st International Seminar on Application for Technology of Information and Communication (ISemantic)
作者: Ismoyo, Dimas Dwiki Wardhani, Rini Wisnu Natl Crypto Inst Engn Fac Bogor Indonesia Natl Crypto Inst Bogor Indonesia
A virtual private network (VPN) extends a private network across a public network, such as the Internet. The purpose of this research study is to implemented ATHS3 stream cipher and VEA block cipher algorithm as the a... 详细信息
来源: 评论
A UML 2.0 Profile to Model block cipher algorithms
收藏 引用
6th European Conference Modelling Foundations and Applications
作者: Balderas-Contreras, Tomas Rodriguez-Gomez, Gustavo Cumplido, Rene Natl Inst Astrophys Opt & Elect Comp Sci Dept Puebla 72840 Mexico
Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical information. To achieve higher performance, the... 详细信息
来源: 评论
A Performance Model for Reconfigurable block cipher Array Utilizing Amdahl's Law
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2022年 第5期E105D卷 964-972页
作者: Qu, Tongzhou Dai, Zibin Liu, Yanjiang Chen, Lin Xia, Xianzhao Inst Informat Sci & Technol Zhengzhou Peoples R China China Automot Technol & Res Ctr Beijing Peoples R China
The existing research on Amdahl's law is limited to multi/many-core processors, and cannot be applied to the important parallel processing architecture of coarse-grained reconfigurable arrays. This paper studies t... 详细信息
来源: 评论
The design and implementation of a block cipher ASIC
The design and implementation of a block cipher ASIC
收藏 引用
4th International Conference on ASIC
作者: Jiang, AP Sheng, SM Fu, YL Liu, Y Ji, LJ Peking Univ Inst Microelect Beijing 100871 Peoples R China
With the rapid progress of information technology, security becomes one of the key factors in information storage, communication and processing. For the reason of speed and security, the requirement for VLSI chips or ... 详细信息
来源: 评论
A new S-box three-layer optimization method and its application
收藏 引用
NONLINEAR DYNAMICS 2023年 第3期111卷 2841-2867页
作者: Su, Yuyue Tong, Xiaojun Zhang, Miao Wang, Zhu Harbin Inst Technol Sch Comp Sci & Technol Weihai 264209 Peoples R China Harbin Inst Technol Sch Informat Sci & Engn Weihai 264209 Peoples R China
As a common nonlinear component in block cipher, S-box plays a role of confusion and determines the security strength of the whole block cipher algorithm. How to generate a high-performance S-box has always been a hot... 详细信息
来源: 评论
Precise Transformation of Feistel to SP Fuse into LFSR
收藏 引用
China Communications 2009年 第4期6卷 168-171页
作者: Luo Lan Qu Zehui Song Chaoming School of Computer Science and Technology University of Electronic Science Technology of China & National Laboratory for Modern Communications Chengdu China
For the published block cipher algorithm, two kinds of round functions have been *** ciphers in network environments are taking more risks than ever before because of their initialization key's distribution in the... 详细信息
来源: 评论
Efficient Multi-Byte Power Analysis Architecture Focusing on Bitwise Linear Leakage
收藏 引用
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS 2024年 第6期23卷 1-25页
作者: Jiang, Zijing Ding, Qun Wang, An Heilongjiang Univ Harbin Heilongjiang Peoples R China Beijing Inst Technol Comp Sci Beijing Peoples R China
As the most commonly used side-channel analysis method, Correlation Power Analysis (CPA) usually uses the divide-and-conquer strategy to guess the single-byte key in the scenario of block cipher parallel implementatio... 详细信息
来源: 评论
A Joint Watermarking/Encryption algorithm for Verifying Medical Image Integrity and authenticity in Both Encrypted and Spatial Domains
A Joint Watermarking/Encryption Algorithm for Verifying Medi...
收藏 引用
33rd Annual International Conference of the IEEE Engineering-in-Medicine-and-Biology-Society (EMBS)
作者: Bouslimi, D. Coatrieux, G. Roux, Ch. Inst Telecom F-29238 Brest 3 France
In this paper, we propose a new joint watermarking/encryption algorithm for the purpose of verifying the reliability of medical images in both encrypted and spatial domains. It combines a substitutive watermarking alg... 详细信息
来源: 评论