咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 3 篇 电气工程
    • 3 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 电子科学与技术(可...

主题

  • 4 篇 decryption algor...
  • 3 篇 encryption algor...
  • 3 篇 cryptography
  • 2 篇 encryption
  • 1 篇 initial populati...
  • 1 篇 hill cipher
  • 1 篇 crossover
  • 1 篇 mutation
  • 1 篇 breaking difficu...
  • 1 篇 information theo...
  • 1 篇 fast public-key ...
  • 1 篇 block cipher
  • 1 篇 symmetric key
  • 1 篇 security evaluat...
  • 1 篇 congruent polyno...
  • 1 篇 fitness score
  • 1 篇 genetic algorith...
  • 1 篇 codes
  • 1 篇 security
  • 1 篇 network security

机构

  • 1 篇 islamia univ bah...
  • 1 篇 tech univ kosici...
  • 1 篇 jazan univ dept ...
  • 1 篇 ntt electrical c...
  • 1 篇 qassim private c...
  • 1 篇 islamia univ bah...
  • 1 篇 islamia univ bah...

作者

  • 1 篇 tariq sana
  • 1 篇 kuppuswamy praka...
  • 1 篇 chovanec martin
  • 1 篇 chovancova eva
  • 1 篇 farooq anum
  • 1 篇 pekarcik peter
  • 1 篇 qureshi muhammad...
  • 1 篇 rekha s. nithya
  • 1 篇 okamoto t
  • 1 篇 amin asjad
  • 1 篇 memon kashif hus...
  • 1 篇 stancel martin

语言

  • 4 篇 英文
检索条件"主题词=Decryption algorithms"
4 条 记 录,以下是1-10 订阅
排序:
Towards the design of new cryptographic algorithm and performance evaluation measures
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2024年 第4期83卷 9709-9759页
作者: Farooq, Anum Tariq, Sana Amin, Asjad Qureshi, Muhammad Ali Memon, Kashif Hussain Islamia Univ Bahawalpur Dept Comp Syst Engn Bahawalpur Pakistan Islamia Univ Bahawalpur Dept Elect Engn Bahawalpur Pakistan Islamia Univ Bahawalpur Dept Informat & Commun Engn Bahawalpur Pakistan
Security and confidentiality are one of the main concerns when transmitting multimedia data over the Internet. To deal with the arising security issues, many advanced cryptographic algorithms have been proposed in the... 详细信息
来源: 评论
FAST PUBLIC-KEY CRYPTOSYSTEM USING CONGRUENT POLYNOMIAL EQUATIONS
收藏 引用
ELECTRONICS LETTERS 1986年 第11期22卷 581-582页
作者: OKAMOTO, T NTT Electrical Communications Laboratories Yokosuka Japan
A fast public-key cryptosystem is proposed which is based on congruent polynomial equations. This scheme is much faster than the RSA scheme. Moreover, the encryption and decyption algorithms for this scheme are very s... 详细信息
来源: 评论
Enhanced Security for Cloud Storage using Linear Block Cipher Algorithm  1
Enhanced Security for Cloud Storage using Linear Block Ciphe...
收藏 引用
International Conference on Cloud Computing (ICCC)
作者: Kuppuswamy, Prakash Rekha, S. Nithya Jazan Univ Dept Comp Engn & Networks Jazan Saudi Arabia Qassim Private Coll Dept Comp Sci & Engn Buraydah Saudi Arabia
Cloud Computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing. Cloud computing is most interesting and enticing technology ... 详细信息
来源: 评论
Application of Genetics algorithms in Cryptography  28
Application of Genetics Algorithms in Cryptography
收藏 引用
28th IEEE International Conference on Intelligent Engineering Systems (INES)
作者: Pekarcik, Peter Chovancova, Eva Chovanec, Martin Stancel, Martin Tech Univ Kosiciach Fak Elektrotechn Informat Katedra Pocitacov Informat Letna 9 Kosice 04200 Slovakia
One of the most essential subfields of modern IT is undoubtedly cybersecurity. The cybersecurity practice, also known as cryptology, combines various disciplines like computer science, computer engineering, and mathem... 详细信息
来源: 评论