咨询与建议

限定检索结果

文献类型

  • 24 篇 会议
  • 12 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 37 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33 篇 工学
    • 20 篇 计算机科学与技术...
    • 11 篇 电气工程
    • 6 篇 信息与通信工程
    • 6 篇 控制科学与工程
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 4 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 7 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 6 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 37 篇 des algorithm
  • 5 篇 block cipher
  • 4 篇 encryption
  • 4 篇 cryptography
  • 3 篇 rsa algorithm
  • 3 篇 data encryption
  • 3 篇 aes algorithm
  • 3 篇 security
  • 3 篇 decryption
  • 2 篇 des deformation
  • 2 篇 data security
  • 2 篇 image encryption
  • 2 篇 iterations
  • 2 篇 secret key
  • 2 篇 encryption algor...
  • 2 篇 cryptanalysis
  • 2 篇 apriori algorith...
  • 2 篇 md5 algorithm
  • 2 篇 module
  • 1 篇 lsb method

机构

  • 1 篇 penn state univ ...
  • 1 篇 neusoft inst inf...
  • 1 篇 taif univ dept i...
  • 1 篇 georgia inst tec...
  • 1 篇 north china elec...
  • 1 篇 chongqing coll f...
  • 1 篇 shanghai univ pe...
  • 1 篇 rgm coll engn & ...
  • 1 篇 aswan univ fac e...
  • 1 篇 vidya coll engn ...
  • 1 篇 vidya coll engn ...
  • 1 篇 univ babylon iee...
  • 1 篇 ecam epmi quartz...
  • 1 篇 queensland univ ...
  • 1 篇 univ bedfordshir...
  • 1 篇 school of comput...
  • 1 篇 north china elec...
  • 1 篇 lviv polytech na...
  • 1 篇 univ sulaimani d...
  • 1 篇 uthm parit raja ...

作者

  • 2 篇 xu guangming
  • 2 篇 lu chang
  • 1 篇 bilal a.y.
  • 1 篇 zhou jie
  • 1 篇 wang xiaoyuan
  • 1 篇 sant p.
  • 1 篇 bourouis sami
  • 1 篇 qiu shui-sheng
  • 1 篇 fouad m.
  • 1 篇 kumar s. ashok s...
  • 1 篇 maple c.
  • 1 篇 narayanan vijayk...
  • 1 篇 das bhagwan
  • 1 篇 brahim a. hadj
  • 1 篇 lilhore umesh ku...
  • 1 篇 osamor jude
  • 1 篇 zhao hong
  • 1 篇 seniv maxym
  • 1 篇 mclauchlan mr
  • 1 篇 epiphaniou g.

语言

  • 35 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=DES algorithm"
37 条 记 录,以下是1-10 订阅
排序:
A novel pseudo-random number generator: combining hyperchaotic system and des algorithm for secure applications
收藏 引用
JOURNAL OF SUPERCOMPUTING 2025年 第1期81卷 1-37页
作者: Brahim, A. Hadj Pacha, H. Ali Naim, M. Pacha, A. Ali USTO MB Univ LACOSI Lab PoB 1505El MNaouer Bir Djir Oran 31000 Algeria ECAM EPMI Quartz Lab 13 Bd LHautil F-95092 Cergy Pontoise France
Generating random values become increasingly desirable due to its advantages. In this paper, a novel pseudo-random number generator is proposed based on a hyperchaotic system and the des algorithm, with the goal of so... 详细信息
来源: 评论
Encryption of accounting data using des algorithm in computing environment
收藏 引用
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2020年 第4期39卷 5085-5095页
作者: Wu, Yanhong Dai, Xiuqing Guangdong Ocean Univ Coll Management Cunjin Coll Zhanjiang 524094 Guangdong Peoples R China
The more and more developed network has caused more and more impact on people's life and work, providing convenient channels for people's information exchange, and then improving people's living and workin... 详细信息
来源: 评论
Power system real time data encryption system based on des algorithm  13
Power system real time data encryption system based on DES a...
收藏 引用
13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
作者: Cui, Ajun Zhao, Hong Zhang, Xu Zhao, Bo Li, Zhiru State Grid Gansu Elect Power Co Lanzhou 730030 Peoples R China Elect Power Res Inst State Grid Gansu Elect Power Lanzhou 730070 Peoples R China
To ensure the safe operation of power system, this paper studies two technologies of data encryption and digital signature, and designs a real-time data encryption system based on des algorithm, which improves the sec... 详细信息
来源: 评论
A New Image Encryption Scheme Based on des algorithm and Chua's Circuit
A New Image Encryption Scheme Based on DES Algorithm and Chu...
收藏 引用
IEEE International Workshop on Imaging Systems and Techniques
作者: Qian Gong-bin Jiang Qing-feng Qiu Shui-sheng South China Univ Technol Sch Elect & Informat Engn Guangzhou Guangdong Peoples R China Shenzhen Univ Fac Informat Engn Shenzhen Peoples R China
In view of Chua's circuit's characters and the deficient in des algorithm, the paper presents a new image encryption scheme. based on des algorithm and chaotic encryption. The chaotic sequence is implemented i... 详细信息
来源: 评论
Exploration on Accounting Data Encryption Processing System Based on des algorithm  1
Exploration on Accounting Data Encryption Processing System ...
收藏 引用
1st IEEE International Conference on Ambient Intelligence, Knowledge Informatics and Industrial Electronics, AIKIIE 2023
作者: Li, Zhi Intelligence Finance and Economics Industry School Shandong Institute of Commerce and Technology Shandong Jinan China
The confidentiality of accounting data is crucial for the security and trade secrets of enterprises. The aim of this study is to explore an accounting data encryption processing system that improves the des algorithm,... 详细信息
来源: 评论
Analysis and improvement of the security of des algorithm
Analysis and improvement of the security of DES algorithm
收藏 引用
2013 International Conference on Sport Science and Computer Science, CCCS 2013
作者: Hu, Meiyan Department of Information Engineering Shandong University of Science and Technology Taian Shandong China
This paper aims to analyze and study the length of the key, the weak key, the design of the S_box, the iterations, and their safety on the basis of the des algorithm. Several transfigurations of des are also put forwa... 详细信息
来源: 评论
Research on DPA Attack Based on Back and Forth Random Round with des algorithm
收藏 引用
电脑学刊 2017年 第1期28卷 69-71页
作者: Tengrun Li Genying Wang Caisen Chen
For the smart card chip in the power leakage problem in the process of des encryption, we put forward accumulative attack algorithm and segmented attack algorithm on des encryption with back and forth random round whi... 详细信息
来源: 评论
Optimized Approach for Secure Communication Using des algorithm
Optimized Approach for Secure Communication Using DES Algori...
收藏 引用
The 5th International Conference on Innovation in Environment, Civil, Materials and Architecture Engineering (IECMAE-17);the 6th International Conference on Advances in Engineering and Technology (RTET-2017);the 7th International Conference on Chemical, Food, Biological and Health Sciences (CFBHS-2017);the 4th International Conference on Literature, History, Humanities and Social Sciences (LHHSS-2017);the 4th Int’l Conference on Studies in Law, Education, Business & Corporate Social Responsibilities (LEBCSR-17);the 5th International Conference on Advances in Engineering, Science, Technology and Waste Management (AESTWM-17)
作者: Gaurav Bothra Chaitali Pandya Animisha Parmar VIT University
Security remains a major "pain" for both individuals and large organizations in today’s modern *** needs security,whether it is communication through telephonic media,or transfer of data *** security or pri... 详细信息
来源: 评论
Analysis and improvement of the security of des algorithm
Analysis and improvement of the security of DES algorithm
收藏 引用
2013 International Conference on Sport Science and Computer Science (CCCS 2013)
作者: Meiyan Hu Department of Information Engineering Shandong University of Science and Technology
This paper aims to analyze and study the length of the key,the weak key,the design of the Sox,the iterations,and their safety on the basis of the des *** transfigurations of des are also put forward to strengthen its ... 详细信息
来源: 评论
Software realization and performance testing of des cryptographic algorithm on the .NET platform
Software realization and performance testing of DES cryptogr...
收藏 引用
9th International Conference on the Experience of designing and Application of CAD Systems in Microelectronics
作者: Yakovyna, Vitaly Fedasyuk, Dmytro Seniv, Maxym Lviv Polytech Natl Univ Software Engn Dept 12 S Bandery Str UA-79013 Lvov Ukraine
The software realization of des symmetric encryption algorithm using CryptoAPI on .NET platform has been analyzed. The processing performance of the software implementation has been tested and it was shown, that the e... 详细信息
来源: 评论