咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献
  • 4 篇 会议
  • 1 册 图书

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 7 篇 计算机科学与技术...
    • 6 篇 电气工程
    • 4 篇 软件工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 信息与通信工程
    • 1 篇 网络空间安全
  • 4 篇 理学
    • 2 篇 数学
    • 1 篇 物理学
    • 1 篇 生物学
    • 1 篇 科学技术史(分学科...
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 12 篇 decryption algor...
  • 3 篇 encryption algor...
  • 2 篇 block cipher
  • 2 篇 ldpc codes
  • 2 篇 security
  • 2 篇 mceliece cryptos...
  • 2 篇 protocols
  • 2 篇 encryption
  • 2 篇 session key
  • 1 篇 bell system
  • 1 篇 b.s.t.j.
  • 1 篇 security require...
  • 1 篇 data security
  • 1 篇 access control
  • 1 篇 medical data
  • 1 篇 cipher
  • 1 篇 data privacy
  • 1 篇 crossover
  • 1 篇 privacy protecti...
  • 1 篇 knapsack

机构

  • 1 篇 jinan university...
  • 1 篇 bauman moscow st...
  • 1 篇 sichuan universi...
  • 1 篇 nokia dept innov...
  • 1 篇 mapscall llc 53 ...
  • 1 篇 beijing inst tec...
  • 1 篇 res inst bit zho...
  • 1 篇 school of inform...
  • 1 篇 univ valladolid ...
  • 1 篇 research institu...
  • 1 篇 uit rgpv dept co...
  • 1 篇 national key lab...
  • 1 篇 suny polytech in...
  • 1 篇 coll charleston ...
  • 1 篇 kyushu univ inst...
  • 1 篇 univ texas san a...
  • 1 篇 shaanxi normal u...
  • 1 篇 uit rgpv dept co...
  • 1 篇 rjit dept inform...
  • 1 篇 natl key lab sci...

作者

  • 2 篇 gupta kamlesh ku...
  • 2 篇 shukla piyush ku...
  • 2 篇 gupta manish
  • 1 篇 li angyang
  • 1 篇 wang jing
  • 1 篇 yang bo
  • 1 篇 yongchen
  • 1 篇 odinokov s. b.
  • 1 篇 shuo zhang
  • 1 篇 cao wenhui
  • 1 篇 ikematsu yasuhik...
  • 1 篇 montano isabel h...
  • 1 篇 wenhui cao
  • 1 篇 takagi tsuyoshi
  • 1 篇 ruchka p. a.
  • 1 篇 zhu yasi
  • 1 篇 zhang shuo
  • 1 篇 dung hoang duong
  • 1 篇 diaz juan ramos
  • 1 篇 choo kim-kwang r...

语言

  • 10 篇 英文
  • 2 篇 其他
检索条件"主题词=Decryption Algorithm"
12 条 记 录,以下是1-10 订阅
A New decryption algorithm of the Quasi-Cyclic Low-Density Parity-Check Codes Based McEliece Cryptosystem  8
A New Decryption Algorithm of the Quasi-Cyclic Low-Density P...
收藏 引用
8th IEEE International Conference on Communication Software and Networks (ICCSN)
作者: Zhang, Shuo Cao, Wenhui Li, Angyang Dong, Wenjie Shao, Liwei Natl Key Lab Sci & Technol Aerosp Intelligence Co Beijing Peoples R China Beijing Inst Technol Sch Informat & Elect Beijing Peoples R China Res Inst BIT Zhongshan Zhongshan Peoples R China
The McEliece public-key cryptosystem is believed to resist quantum attacks, but has not been used because of the extremely large public key size. In order to decrease the public key size, quasi-cyclic low-density pari... 详细信息
来源: 评论
Bstj 60: 5. May-June 1981: B.S.T.J. Briefs: Fast decryption algorithm for the Knapsack Cryptographic System. (Henry, P.S.)
收藏 引用
2016年
Bstj 60: 5. May-June 1981: B.S.T.J. Briefs: Fast decryption algorithm for the Knapsack Cryptographic System. (Henry, P.S.) by published by
来源: 评论
A New decryption algorithm of the Quasi-Cyclic Low-Density Parity-Check Codes Based McEliece Cryptosystem
A New Decryption Algorithm of the Quasi-Cyclic Low-Density P...
收藏 引用
2016 8th IEEE International Conference on Communication Software and Networks(ICCSN 2016)
作者: Shuo Zhang Wenhui Cao Angyang Li Wenjie Dong Liwei Shao National Key Laboratory of Science and Technology on Aerospace Intelligence Control School of Information and Electronics Beijing Institute of Technology Research Institute of BIT in Zhongshan
The McEliece public-key cryptosystem is believed to resist quantum attacks,but has not been used because of the extremely large public key *** order to decrease the public key size,quasi-cyclic low-density parity-chec... 详细信息
来源: 评论
Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network
收藏 引用
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING 2024年 第1期11卷 1008-1025页
作者: Rasheed, Amar Baza, Mohamed Badr, Mahmoud. M. Alshahrani, Hani Choo, Kim-Kwang Raymond Sam Houston State Univ Dept Comp Sci Huntsville TX 77340 USA Coll Charleston Dept Comp Sci Charleston SC 29424 USA Suny Polytech Inst Dept Network & Comp Secur Utica NY 13502 USA Najran Univ Coll Comp Sci & Informat Syst Dept Comp Sci Najran 61441 Saudi Arabia Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX 78260 USA
Smart vehicles and industrial control systems becoming increasingly complex. They are comprised of a large number of connected intelligence sensor devices. For such systems, Controller Area Network (CAN) bus offer hig... 详细信息
来源: 评论
Bidirectional Identity-Based Inner-Product Functional Re-Encryption in Vaccine Data Sharing
收藏 引用
IEEE Transactions on Cloud Computing 2025年 第2期13卷 617-628页
作者: Wang, Jing Zhou, Yanwei Zhu, Yasi Liu, Zhiquan Yang, Bo Zhang, Mingwu Shaanxi Normal University School of Computer Science Xi’an710119 China Sichuan University Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610017 China Jinan University College of Cyber Security Guangzhou510632 China Hubei University of Technology School of Computer Wuhan430068 China
With the development of cloud computing, more and more data is stored in cloud servers, which leads to an increasing degree of privacy of data stored in cloud servers. For example, in the critical domain of medical va... 详细信息
来源: 评论
Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition ciphers
收藏 引用
CRYPTOLOGIA 2023年 第1期47卷 38-47页
作者: Relkin, Paul W. Mapscall LLC 53 Eckerson Rd Harrington Pk NJ 07640 USA
Olum 2 is one of two ciphers created more than 75 years ago by mathematician Paul Olum to challenge his Manhattan Project officemate, physicist Richard Feynman. In this manuscript, I describe the first successful decr... 详细信息
来源: 评论
Securecipher: An instantaneous synchronization stream encryption system for insider threat data leakage protection
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2024年 254卷
作者: Montano, Isabel Herrera Diaz, Juan Ramos Aranda, Jose Javier Garcia Molina-Cardin, Sergio Lopez, Juan Jose Guerrero Diez, Isabel de la Torre Univ Valladolid Dept Signal Theory & Commun & Telemat Engn Paseo Belen 15 Valladolid 47011 Spain Nokia Dept Innovat Maria Tubau St 9 Madrid 28050 Spain
The paper addresses the persistent challenge of insider threat in cybersecurity. Despite advancements in detection and prevention technologies and approaches, the complexity of digital environments and the ingenuity o... 详细信息
来源: 评论
Session key based fast, secure and lightweight image encryption algorithm
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2021年 第7期80卷 10391-10416页
作者: Gupta, Manish Gupta, Kamlesh Kumar Shukla, Piyush Kumar UIT RGPV Dept Comp Sci & Engn Bhopal India RJIT Dept Informat Technol Tekanpur India
Nowadays, most of the communications in IoT enabled devices are done in the form of images. To protect the images from intruders, there is a need for a secure encryption algorithm. Many encryption algorithms have been... 详细信息
来源: 评论
Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2021年 第25期80卷 33843-33863页
作者: Gupta, Manish Gupta, Kamlesh Kumar Shukla, Piyush Kumar UIT RGPV Dept Comp Sci & Engn Bhopal MP India RJIT Dept Informat Technol Tekanpur MP India
In the current era, the majority of communication in IoT-enabled devices, such as smartphones, is now done through images. To shield the images from invaders, a reliable encryption algorithm is needed. Several encrypt... 详细信息
来源: 评论
Efficient decryption algorithms for Extension Field Cancellation Type Encryption Schemes  23rd
Efficient Decryption Algorithms for Extension Field Cancella...
收藏 引用
23rd Australasian Conference on Information Security and Privacy (ACISP)
作者: Wang, Yacheng Ikematsu, Yasuhiko Dung Hoang Duong Takagi, Tsuyoshi Univ Tokyo Dept Math Informat Bunkyo Ku Hongo 7-3-1 Tokyo 1138656 Japan Kyushu Univ Inst Math Ind Nishi Ku 744 Motooka Fukuoka 8190395 Japan
Extension Field Cancellation (EFC) was proposed by Alan et al. at PQCrypto 2016 as a new trapdoor for constructing secure multivariate encryption cryptographic schemes. Along with this trapdoor, two schemes EFCp- and ... 详细信息
来源: 评论