咨询与建议

限定检索结果

文献类型

  • 50 篇 会议
  • 32 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 84 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 57 篇 计算机科学与技术...
    • 33 篇 电气工程
    • 22 篇 信息与通信工程
    • 11 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 3 篇 石油与天然气工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
  • 7 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 6 篇 理学
    • 5 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 3 篇 医学
    • 2 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 84 篇 cryptographic al...
  • 12 篇 cryptography
  • 11 篇 security
  • 7 篇 encryption
  • 5 篇 fpga
  • 4 篇 throughput
  • 4 篇 aes
  • 4 篇 smart grid
  • 3 篇 power grid
  • 3 篇 wide-area monito...
  • 3 篇 block cipher
  • 3 篇 rsa
  • 3 篇 decryption
  • 3 篇 cloud computing
  • 3 篇 scheduling
  • 3 篇 digital signatur...
  • 2 篇 application spec...
  • 2 篇 data security
  • 2 篇 access control
  • 2 篇 cipher

机构

  • 3 篇 univ chinese aca...
  • 2 篇 loyola univ mary...
  • 2 篇 science and tech...
  • 2 篇 kookmin univ dep...
  • 2 篇 brno university ...
  • 2 篇 chinese acad sci...
  • 2 篇 tsinghua univ in...
  • 2 篇 univ chile dept ...
  • 1 篇 univ cooperat co...
  • 1 篇 dept. of compute...
  • 1 篇 elect & telecomm...
  • 1 篇 al maarif univ c...
  • 1 篇 delhi technical ...
  • 1 篇 hiroshima univ r...
  • 1 篇 chinese acad sci...
  • 1 篇 chinese acad sci...
  • 1 篇 sci & technol co...
  • 1 篇 tsinghua univ ts...
  • 1 篇 dept.of computer...
  • 1 篇 electrical engin...

作者

  • 2 篇 li zerun
  • 2 篇 zhang lei
  • 2 篇 baloian nelson
  • 2 篇 chakraborty moum...
  • 2 篇 yun seunghwan
  • 2 篇 budko mikhail
  • 2 篇 wu liji
  • 2 篇 kuhn d. richard
  • 2 篇 yi okyeon
  • 2 篇 saha debasri
  • 2 篇 qiu meikang
  • 2 篇 zhang xiangmin
  • 2 篇 liu rui
  • 2 篇 chakrabarti amla...
  • 2 篇 kacker raghu
  • 2 篇 guirik alexei
  • 2 篇 lijun zhang
  • 2 篇 zhang xiaoyu
  • 2 篇 luther wolfram
  • 2 篇 jia fan

语言

  • 78 篇 英文
  • 4 篇 其他
  • 2 篇 中文
检索条件"主题词=Cryptographic Algorithm"
84 条 记 录,以下是11-20 订阅
Amplified Template Attack of cryptographic algorithms  7
Amplified Template Attack of Cryptographic Algorithms
收藏 引用
7th International Conference on Computer and Knowledge Engineering (ICCKE)
作者: Shanbehzadeh, Davood Bagheri, Mohammad Reza Shahid Beheshti Dept Elect Res Ctr Tehran Iran
this paper presents a new method to implement template based simple power analysis of cryptographic algorithms. Template attacks are most powerful side channel technique to evaluation cryptographic hardware. They use ... 详细信息
来源: 评论
A Survey on Hardware Implementation of cryptographic algorithms Using Field Programmable Gate Array  9
A Survey on Hardware Implementation of Cryptographic Algorit...
收藏 引用
IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)
作者: Kumar, Keshav Ramkumar, K. R. Kaur, Amanpreet Choudhary, Somanshu Chitkara Univ Chitkara Univ Inst Engn & Technol Patiala Punjab India
In the past recent years the idea towards secure data communication is increasing day by day. The secure communication is being achieved by applying various cryptographic algorithms on the data which is to be transfer... 详细信息
来源: 评论
Efficiency Comparison of Pseudorandom Number Generators Based on Strong cryptographic algorithms  10
Efficiency Comparison of Pseudorandom Number Generators Base...
收藏 引用
10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) - Emerging Technologies for Connected Society
作者: Grozov, Vladimir Guirik, Alexei Budko, Marina Budko, Mikhail ITMO Univ Fac Secure Informat Technol St Petersburg Russia
In this paper, we study the statistical properties of pseudorandom number sequence (PRS) generators (PRNGs) based on strong cryptographic algorithms. We propose a method for assessing the quality of PRS generators and... 详细信息
来源: 评论
Statistical Evaluation of cryptographic algorithms
Statistical Evaluation of Cryptographic Algorithms
收藏 引用
8th International Conference on Communications
作者: Andrasiu, Mircea Popescu, Adrian Simion, Gheorghe Univ Wales Romania Bucharest Romania Military Tech Acad Bucharest Romania Univ Politehn Bucharest Romania
This paper is intended to present software for testing and evaluating cryptographic algorithms. The proposed software is an improvement of NIST -Statistical Test Suite, designed after NIST SP 800-22. The upgrade is re... 详细信息
来源: 评论
New Enhanced Hybrid cryptographic algorithms in Cloud Network  1
New Enhanced Hybrid Cryptographic Algorithms in Cloud Networ...
收藏 引用
1st International Conference on Advances in Electrical, Electronics and Computational Intelligence, ICAEECI 2023
作者: Singla, Garima Kaur, Gaganjot Chandigarh University Computer Science & Engineering Mohali India
Cloud networks have become increasingly popular due to their scalability and flexibility, but they also face new security challenges. To address these challenges, researchers have proposed many cryptographic algorithm... 详细信息
来源: 评论
Secure Sensitive Data Sharing Using RSA and ElGamal cryptographic algorithms with Hash Functions
收藏 引用
INFORMATION 2022年 第10期13卷 442页
作者: Adeniyi, Emmanuel A. Falola, Peace Busola Maashi, Mashael S. Aljebreen, Mohammed Bharany, Salil Precious Cornerstone Univ Dept Comp Sci Ibadan 200223 Nigeria King Saud Univ Coll Comp & Informat Sci Software Engn Dept Riyadh 11451 Saudi Arabia King Saud Univ Community Coll Dept Comp Sci POB 28095 Riyadh 11437 Saudi Arabia Guru Nanak Dev Univ Dept Comp Engn & Technol Amritsar 143005 Punjab India
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users' credentia... 详细信息
来源: 评论
Software-Based Parallel cryptographic Solution with Massive-Parallel Memory-Embedded SIMD Matrix Architecture for Data-Storage Systems
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2011年 第9期E94D卷 1742-1754页
作者: Kumaki, Takeshi Koide, Tetsushi Mattausch, Hans Juergen Tagami, Masaharu Ishizaki, Masakatsu Ritsumeikan Univ Dept VLSI Syst Design Kusatsu 5258577 Japan Hiroshima Univ Res Inst Nanodevice & Bio Syst Higashihiroshima 7398527 Japan
This paper presents a software-based parallel cryptographic solution with a massive-parallel memory-embedded SIMD matrix (MTX) for data-storage systems. MTX can have up to 2,048 2-bit processing elements, which are co... 详细信息
来源: 评论
Performance Comparison of Hyper-V and KVM for cryptographic Tasks in Cloud Computing
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 2023-2045页
作者: Nader Abdel Karim Osama A.Khashan Waleed K.Abdulraheem Moutaz Alazab Hasan Kanaker Mahmoud E.Farfoura Mohammad Alshinwan Department of Intelligent Systems Faculty of Artificial IntelligenceAl-Balqa Applied UniversityAl-Salt1705Jordan Research and Innovation Centers Rabdan AcademyP.O.Box 114646Abu DhabiUnited Arab Emirates Department of Information Systems and Networks TheWorld Islamic Sciences and Education UniversityAmman11947Jordan Department of Cyber Security Isra UniversityAmman1162Jordan Faculty of Science and Information Technology Al-Zaytoonah University of JordanAmman11733Jordan Middle East University Research Unit Middle East UniversityAmman11831Jordan
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i... 详细信息
来源: 评论
Crypto-DSEDA: A Domain-Specific EDA Flow for CiM-Based cryptographic Accelerators
IEEE DESIGN & TEST
收藏 引用
IEEE DESIGN & TEST 2024年 第5期41卷 46-54页
作者: Liu, Rui Li, Zerun Zhang, Xiaoyu Li, Wanqian Shen, Libo Tang, Rui Luo, Zhejian Chen, Xiaoming Han, Yinhe Tang, Minghua Xiangtan Univ Sch Mat Sci & Engn Xiangtan 411105 Peoples R China Chinese Acad Sci Inst Comp Technol Beijing 100083 Peoples R China Univ Chinese Acad Sci Beijing 101408 Peoples R China
Editor ’s notes: The authors propose Crypto-DSEDA, an auto-generation framework for exploring Computing-in-Memory (CiM)-based cryptographic accelerators. Crypto-DSEDA includes an automatic architecture generation pip... 详细信息
来源: 评论
Finding Bugs in cryptographic Hash Function Implementations
收藏 引用
IEEE TRANSACTIONS ON RELIABILITY 2018年 第3期67卷 870-884页
作者: Mouha, Nicky Raunak, Mohammad S. Kuhn, D. Richard Kacker, Raghu NIST Informat Technol Lab Comp Secur Div Gaithersburg MD 20899 USA NIST Comp Secur Div Gaithersburg MD 20899 USA Loyola Univ Maryland Dept Comp Sci Baltimore MD 21210 USA
cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unn... 详细信息
来源: 评论