咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是241-250 订阅
排序:
Enhancing Data Security with RSA-SHA 256: Mitigating Timing Attacks  15
Enhancing Data Security with RSA-SHA 256: Mitigating Timing ...
收藏 引用
15th International Conference on Information and Communication Technology Convergence, ICTC 2024
作者: Acasamoso, Dominador M. Sison, Ariel M. Medina, Ruji P. Technological Institute of the Philippines Quezon City Philippines Emilio Aguinaldo College Manila Philippines
This work considered the improvement of the RSA cryptosystem using a Secure Hash Algorithm, SHA-256, in its attempt to forestall attacks, more so against timing attacks. RSA is one of the most used asymmetric encrypti... 详细信息
来源: 评论
Research on Cryptography Based on Quantum-Resistant algorithms
Research on Cryptography Based on Quantum-Resistant Algorith...
收藏 引用
2024 International Conference on Electronics and Devices, Computational Science, ICEDCS 2024
作者: Yu, Zhouke Hunan University Changsha410082 China
In this paper, we discuss the challenges of quantum computing to traditional cryptography and the latest development of post-quantum cryptography as a coping strategy. As quantum computing advances, cryptographic algo... 详细信息
来源: 评论
Quantum-Enhanced Elliptic Curve Cryptography Implementations for IoT: A Comparative Analysis  18
Quantum-Enhanced Elliptic Curve Cryptography Implementations...
收藏 引用
18th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2024
作者: Sahay, Rashmi Sekaran, Kaushik Priyadharshini, M. The Icfai Foundation for Higher Education Faculty of Science and Technology IcfaiTech Hyderabad India
The rapid advancements in quantum computation pose significant threats to traditional cryptographic systems, such as those used in the Internet of Things (IoT). RSA and methods like Elliptic Curve Cryptography (ECC) a... 详细信息
来源: 评论
An Optimization Method for National Cryptography Algorithm  1
An Optimization Method for National Cryptography Algorithm
收藏 引用
1st International Symposium on Parallel Computing and Distributed Systems, PCDS 2024
作者: Hu, Jun Li, Jiajun Xi, Qiushi He, Song Hu, Yahui Cheng, Min AirForce Early Warning Academy Wuhan China
A Python optimization method is proposed to ad-dress the slow and inefficient encryption speed of third-party libraries (gmssl and pysmx) commonly used in Python to im-plement national security encryption algorithms. ... 详细信息
来源: 评论
Strengthening Cryptographic Protocols: Leveraging the Soham Transform's Unique Capabilities  5
Strengthening Cryptographic Protocols: Leveraging the Soham ...
收藏 引用
5th International Conference on Data Analytics for Business and Industry, ICDABI 2024
作者: Raghavendran, Prabakaran Gunasekar, Tharmalingam Gochhait, Saikat Vel Tech Rangarajan Dr.Sagunthala RandD Institute of Science and Technology Department of Mathematics Chennai India International Deemed University Constituent of Symbiosis Symbiosis Institute of Digital and Telecom Management Pune India
This article presents a new cryptographic technique combining Soham transformation technique with congruence modulo operator for improving the security of data. The method utilises mathematical formulas to code and de... 详细信息
来源: 评论
Study of properties, applications and software implementation of the digital signature algorithm based on elliptic curves  11
Study of properties, applications and software implementatio...
收藏 引用
11th International Scientific Conference "Information Technology and Implementation", IT and I 2024
作者: Buchyk, Serhii Shabanova, Anastasiia Toliupa, Serhii Buchyk, Oleksandr Delembovskyi, Maksym Taras Shevchenko National University ofKyiv 60 Volodymyrska St. Kyiv01033 Ukraine Kyiv National University of Civil Engineering and Architecture Povitrianykh Syl ave. 31 Kyiv03037 Ukraine
The development of a digital signature algorithm based on elliptic curves, which is based on the basic models of asymmetric cryptography, confirms the increased security of the authentication procedure, which in turn ... 详细信息
来源: 评论
Hardware implementation of lightweight cryptographic algorithms: An overview
Hardware implementation of lightweight cryptographic algorit...
收藏 引用
2024 International Conference Automatics and Informatics, ICAI 2024
作者: Dimitrova, Dilyana Dimitrov, Ivaylo Nikola Vaptsarov Naval Academy Department of Information Technologies Varna Bulgaria Blu11 Ltd Engineering Department Varna Bulgaria
The main aim of the paper is to evaluate and compare the hardware implementation of three lightweight cryptographic algorithms - SKINNY, ForkAE, and Romulus to determine their efficiency and suitability for IoT enviro... 详细信息
来源: 评论
End-To-End Encrypted Agriculture Chatbot  8
End-To-End Encrypted Agriculture Chatbot
收藏 引用
8th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2024
作者: Reddy, Pennabadi Devendra Reddy, K Satya Sampath Jayanth, P. Kavitha, C.R. Amrita School of Computing Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Bengaluru India
Agriculture sector is considered to be one of the most prominent sectors in the Indian economy. Farmers constantly face challenges such as a lack of information on best practices, disease detection, and market informa... 详细信息
来源: 评论
Lightweight AES Algorithm for Internet of Things: An Energy Consumption Analysis  14
Lightweight AES Algorithm for Internet of Things: An Energy ...
收藏 引用
14th Brazilian Symposium on Computing Systems Engineering, SBESC 2024
作者: Vaz, Yuri Silva Mattos, Julio C. B. Soares, Rafael Iankowski Technological Development Center Pelotas Brazil
The security of IoT applications remains one of the biggest challenges, given that the vast majority of applications are developed on devices with limited computational resources and interconnected by the Internet. By... 详细信息
来源: 评论
Comparative Study of Cryptographic algorithms in Post Quantum Computing Landscape  5
Comparative Study of Cryptographic Algorithms in Post Quantu...
收藏 引用
5th International Conference on Data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Sahoo, Anshuman Indira Kumar, A.K. Rajagopal, Shinu M. Amrita Vishwa Vidyapeetham Amrita School of Computing Dept. of Computer Science and Engineering Bengaluru India
As the advent of quantum computing looms, the cryptographic landscape faces unprecedented challenges that could render traditional algorithms like AES, RSA, and ECC vulnerable. This paper delves into a comparative stu... 详细信息
来源: 评论