咨询与建议

限定检索结果

文献类型

  • 10 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 8 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 信息与通信工程
    • 3 篇 软件工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 生物医学工程(可授...
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 医学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 18 篇 block cipher alg...
  • 4 篇 cryptography
  • 2 篇 encryption algor...
  • 2 篇 cloud security
  • 2 篇 area cost
  • 2 篇 interconnection ...
  • 2 篇 stream cipher al...
  • 2 篇 coarse-grain rec...
  • 1 篇 high order stati...
  • 1 篇 performance
  • 1 篇 filters
  • 1 篇 reliability
  • 1 篇 internet of thin...
  • 1 篇 vlsi chip
  • 1 篇 joint watermarki...
  • 1 篇 parallelism
  • 1 篇 cmos integrated ...
  • 1 篇 hybrid descast.
  • 1 篇 power analysis a...
  • 1 篇 orthogonal latin...

机构

  • 2 篇 school of microe...
  • 2 篇 department of mi...
  • 1 篇 yonsei univ sch ...
  • 1 篇 inha univ coll i...
  • 1 篇 natl crypto inst...
  • 1 篇 univ coll bahrai...
  • 1 篇 inst telecom f-2...
  • 1 篇 china automot te...
  • 1 篇 college of lnfo....
  • 1 篇 natl inst astrop...
  • 1 篇 research center ...
  • 1 篇 natl crypto inst...
  • 1 篇 heilongjiang uni...
  • 1 篇 university colle...
  • 1 篇 zhoukou normal u...
  • 1 篇 city univ hong k...
  • 1 篇 institut telecom...
  • 1 篇 harbin inst tech...
  • 1 篇 peking univ inst...
  • 1 篇 beijing inst tec...

作者

  • 2 篇 zibin dai
  • 2 篇 wei li
  • 2 篇 longmei nan
  • 2 篇 tongzhou qu
  • 2 篇 anqi yin
  • 1 篇 ismoyo dimas dwi...
  • 1 篇 sengupta nandita
  • 1 篇 wang lei
  • 1 篇 liu y
  • 1 篇 huang yuhua
  • 1 篇 tong xiaojun
  • 1 篇 coatrieux g.
  • 1 篇 chinnasamy ramya
  • 1 篇 jiang ap
  • 1 篇 sheng sm
  • 1 篇 yi jaeyoung
  • 1 篇 balderas-contrer...
  • 1 篇 jiang zijing
  • 1 篇 xia xianzhao
  • 1 篇 su yuyue

语言

  • 17 篇 英文
  • 1 篇 中文
检索条件"主题词=Block cipher algorithm"
18 条 记 录,以下是1-10 订阅
排序:
A Sink Node Trusted Access Authentication Protocol for Mobile Wireless Sensor Network Using block cipher algorithm Based on IoT
收藏 引用
INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS 2020年 第2期27卷 234-240页
作者: Wang, Qian Chen, Wenxia Wang, Lei Zhoukou Normal Univ Coll Comp Sci & Technol Zhoukou 466001 Henan Peoples R China Zhoukou Senior Tech Sch Zhoukou 466001 Henan Peoples R China Soochow Univ Ctr Informat Dev & Management Suzhou 215006 Jiangsu Peoples R China
Aiming at the problem that mobile nodes in Wireless Sensor Network (WSN) lack credibility verification, a Sink node trusted access authentication protocol using packet cipher algorithm for mobile WSN is proposed based... 详细信息
来源: 评论
A Performance Model for Reconfigurable block cipher Array Utilizing Amdahl's Law
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2022年 第5期E105D卷 964-972页
作者: Qu, Tongzhou Dai, Zibin Liu, Yanjiang Chen, Lin Xia, Xianzhao Inst Informat Sci & Technol Zhengzhou Peoples R China China Automot Technol & Res Ctr Beijing Peoples R China
The existing research on Amdahl's law is limited to multi/many-core processors, and cannot be applied to the important parallel processing architecture of coarse-grained reconfigurable arrays. This paper studies t... 详细信息
来源: 评论
Efficient Multi-Byte Power Analysis Architecture Focusing on Bitwise Linear Leakage
收藏 引用
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS 2024年 第6期23卷 1-25页
作者: Jiang, Zijing Ding, Qun Wang, An Heilongjiang Univ Harbin Heilongjiang Peoples R China Beijing Inst Technol Comp Sci Beijing Peoples R China
As the most commonly used side-channel analysis method, Correlation Power Analysis (CPA) usually uses the divide-and-conquer strategy to guess the single-byte key in the scenario of block cipher parallel implementatio... 详细信息
来源: 评论
A new S-box three-layer optimization method and its application
收藏 引用
NONLINEAR DYNAMICS 2023年 第3期111卷 2841-2867页
作者: Su, Yuyue Tong, Xiaojun Zhang, Miao Wang, Zhu Harbin Inst Technol Sch Comp Sci & Technol Weihai 264209 Peoples R China Harbin Inst Technol Sch Informat Sci & Engn Weihai 264209 Peoples R China
As a common nonlinear component in block cipher, S-box plays a role of confusion and determines the security strength of the whole block cipher algorithm. How to generate a high-performance S-box has always been a hot... 详细信息
来源: 评论
An infinite perfect-secrecy system with non-uniformly distributed keys
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022年 68卷
作者: Tian, Chuanjun Chen, Guanrong Shenzhen Univ Coll Elect & Informat Engn Shenzhen 518060 Peoples R China City Univ Hong Kong Dept Elect Engn Hong Kong Peoples R China
Based on some recent results derived from the Shannon theory of secrecy systems, this paper develops a new mathematical model for an infinite cryptosystem with perfect secrecy, and establishes a sufficient condition f... 详细信息
来源: 评论
block cipher and Stream cipher algorithm Performance Comparison in a Personal VPN Gateway
Block Cipher and Stream Cipher Algorithm Performance Compari...
收藏 引用
1st International Seminar on Application for Technology of Information and Communication (ISemantic)
作者: Ismoyo, Dimas Dwiki Wardhani, Rini Wisnu Natl Crypto Inst Engn Fac Bogor Indonesia Natl Crypto Inst Bogor Indonesia
A virtual private network (VPN) extends a private network across a public network, such as the Internet. The purpose of this research study is to implemented ATHS3 stream cipher and VEA block cipher algorithm as the a... 详细信息
来源: 评论
An Area-Efficient Interconnection Network for Coarse-Grain Reconfigurable Cryptographic Array  12
An Area-Efficient Interconnection Network for Coarse-Grain R...
收藏 引用
2017 IEEE 12th International Conference on ASIC
作者: Tongzhou Qu Zibin Dai Longmei Nan Wei Li Anqi Yin Department of Microelectronics Institute of Information Science and Technology School of Microelectronics Fudan University
Interconnection network plays an important role in Coarse-Grained Reconfigurable Arrays and it has a significant influence on the performance,area overhead and power *** make the interconnection network adapt to the m... 详细信息
来源: 评论
An Area-Efficient Interconnection Network for Coarse-Grain Reconfigurable Cryptographic Array
An Area-Efficient Interconnection Network for Coarse-Grain R...
收藏 引用
IEEE International Conference on ASIC
作者: Tongzhou Qu Zibin Dai Longmei Nan Wei Li Anqi Yin Department of Microelectronics Institute of Information Science and Technology Zhengzhou China School of Microelectronics Fudan University Shanghai China
Interconnection network plays an important role in Coarse-Grained Reconfigurable Arrays and it has a significant influence on the performance, area overhead and power consumption. To make the interconnection network a... 详细信息
来源: 评论
Contriving Hybrid DESCAST algorithm for Cloud Security  11
Contriving Hybrid DESCAST Algorithm for Cloud Security
收藏 引用
11th International Conference on Communication Networks (ICCN)
作者: Sengupta, Nandita Chinnasamy, Ramya Univ Coll Bahrain Dept Informat Technol Manama Bahrain
Cloud computing has taken a major part in IT industry both for an individual and the organization. Primarily, it's used as infrastructure as a service, platform as a service, file storage, disaster recovery and ba... 详细信息
来源: 评论
Contriving Hybrid DESCAST algorithm for Cloud Security
收藏 引用
Procedia Computer Science 2015年 54卷 47-56页
作者: Nandita Sengupta Ramya Chinnasamy University College of Bahrain Information Technology Department Manama Bahrain
Cloud computing has taken a major part in IT industry both for an individual and the organization. Primarily, it's used as infrastructure as a service, platform as a service, file storage, disaster recovery and ba... 详细信息
来源: 评论