咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是371-380 订阅
排序:
CATEGORICAL COMPOSABLE CRYPTOGRAPHY: EXTENDED VERSION
arXiv
收藏 引用
arXiv 2022年
作者: Broadbent, Anne Karvonen, Martti Department of Mathematics and Statistics University of Ottawa Canada
We formalize the simulation paradigm of cryptography in terms of category theory and show that protocols secure against abstract attacks form a symmetric monoidal category, thus giving an abstract model of composable ... 详细信息
来源: 评论
Encrypted system identification as-a-service via reliable encrypted matrix inversion
arXiv
收藏 引用
arXiv 2024年
作者: Adamek, Janis Binfet, Philipp Schlüter, Nils Darup, Moritz Schulze Control and Cyber-physical Systems Group Department of Mechanical Engineering TU Dortmund University Germany
Encrypted computation opens up promising avenues across a plethora of application domains, including machine learning, health-care, finance, and control. Arithmetic homomorphic encryption, in particular, is a natural ... 详细信息
来源: 评论
MNT Elliptic Curves with Non-Prime Order
arXiv
收藏 引用
arXiv 2024年
作者: Grześkowiak, Maciej
Miyaji, Nakabayashi, and Takano proposed the algorithm for the construction of prime order pairing-friendly elliptic curves with embedding degrees k = 3, 4, 6. We present a method for generating generalized MNT curves... 详细信息
来源: 评论
Factoring integers via Schnorr’s algorithm assisted with VQE
arXiv
收藏 引用
arXiv 2024年
作者: Sánchez Cano, Luis Carrascal de las Heras, Ginés Botella Juan, Guillermo del Barrio García, Alberto Iberdrola S.A. Madrid28033 Spain IT Systems and Computation Department Complutense University of Madrid Madrid28040 Spain IBM Quantum IBM Consulting España Madrid28830 Spain Computer Architecture and Automation Department Complutense University of Madrid Madrid28040 Spain
Current asymmetric cryptography is based on the principle that while classical computers can efficiently multiply large integers, the inverse operation, factorization, is significantly more complex. For sufficiently l... 详细信息
来源: 评论
The Continuous Logarithm in the Complex Circle for Post-Quantum Cryptographic algorithms
arXiv
收藏 引用
arXiv 2024年
作者: Gaber, Jaafar University of Marie and Louis Pasteur UTBM CNRS FEMTO-ST Institute BelfortF-90010 France
This paper introduces a novel cryptographic approach based on the continuous logarithm in the complex circle, designed to address the challenges posed by quantum computing. By leveraging its multi-valued and spectral ... 详细信息
来源: 评论
A New Algorithm for Computing Branch Number of Non-Singular Matrices over Finite Fields
arXiv
收藏 引用
arXiv 2024年
作者: Mishra, P.R. Kumar, Yogesh Samanta, Susanta Gaur, Atul Scientific Analysis Group DRDO Metcalfe House Complex Delhi110054 India R. C. Bose Centre for Cryptology and Security Indian Statistical Institute Kolkata700108 India Department of Mathematics University of Delhi Delhi110007 India
The notion of branch number of a linear transformation is crucial for both linear and differential cryptanalysis. The number of nonzero elements in a state difference or linear mask directly correlates with the active... 详细信息
来源: 评论
A Practical Exercise in Adapting SIFT Using FHE Primitives
arXiv
收藏 引用
arXiv 2024年
作者: Balappanawar, Ishwar B. Kommireddy, Bhargav Srinivas IIIT Hyderabad India
An exercise in implementing Scale Invariant Feature Transform using CKKS Fully Homomorphic encryption quickly reveals some glaring limitations in the current FHE paradigm. These limitations include the lack of a stand... 详细信息
来源: 评论
The complexity of solving a random polynomial system
arXiv
收藏 引用
arXiv 2023年
作者: Gaggero, Giulia Gorla, Elisa
A multivariate cryptograpic instance in practice is a multivariate polynomialsystem. So the security of a protocol rely on the complexity of solving amultivariate polynomial system. In this paper there is an overview ... 详细信息
来源: 评论
Modeling and simulation of common primitive operations used in block ciphers  07
Modeling and simulation of common primitive operations used ...
收藏 引用
Proceedings of the 2007 Summer Computer Simulation Conference
作者: Praveen R. Samala Hamid Vakilzadian Dietmar P. F. Möller University of Nebraska-Lincoln University of Hamburg Germany
Secure transmission of information is of interest to both public and private sectors. This is especially important with today's increased use of the internet for e-commerce. This research has been motivated by the... 详细信息
来源: 评论
Encrypted Dynamic Control exploiting Limited Number of Multiplications and a Method using RLWE-based Cryptosystem
arXiv
收藏 引用
arXiv 2023年
作者: Lee, Joowon Lee, Donggil Kim, Junsoo Shim, Hyungbo ASRI Department of Electrical and Computer Engineering Seoul National University Korea Republic of Department of Electrical Engineering Incheon National University Korea Republic of Department of Electrical and Information Engineering Seoul National University of Science and Technology Korea Republic of
In this paper, we present a method to encrypt dynamic controllers that can be implemented through most homomorphic encryption schemes, including somewhat, leveled fully, and fully homomorphic encryption. To this end, ... 详细信息
来源: 评论