咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是381-390 订阅
排序:
An Efficient Algorithm for Modulus Operation and Its Hardware Implementation in Prime Number Calculation
arXiv
收藏 引用
arXiv 2024年
作者: Wijesinghe, W.A. Susantha Department of Electronics Wayamba University of Sri Lanka Kuliyapitiya Sri Lanka
This paper presents a novel algorithm for the modulus operation for FPGA implementation. The proposed algorithm use only addition, subtraction, logical, and bit shift operations, avoiding the complexities and hardware... 详细信息
来源: 评论
Multi-Layered Security System: Integrating Quantum Key Distribution with Classical Cryptography to Enhance Steganographic Security
arXiv
收藏 引用
arXiv 2024年
作者: Sykot, Arman Azad, Md Shawmoon Tanha, Wahida Rahman Morshed, B.M. Monjur Shubha, Syed Emad Uddin Mahdy, M.R.C. Department of Electrical and Computer Engineering North South University Bashundhara R/A Dhaka1229 Bangladesh
In this paper, we present a novel cryptographic system that integrates Quantum Key Distribution (QKD) with classical encryption techniques to secure steganographic images. Our approach leverages the E91 QKD protocol t... 详细信息
来源: 评论
Double Index Calculus Algorithm: Faster Solving Discrete Logarithm Problem in Finite Prime Field
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Wen Zhang, Zhishuo Zhao, Weixin Peng, Jian Liao, Yongjian Wang, Yuyu Sichuan University Chengdu610065 China Chengdu610054 China
Solving the discrete logarithm problem in a finite prime field is an extremely important computing problem in modern cryptography. The hardness of solving the discrete logarithm problem in a finite prime field is the ... 详细信息
来源: 评论
Generalized one-way function and its application
arXiv
收藏 引用
arXiv 2024年
作者: Yin, Hua-Lei Department of Physics Beijing Key Laboratory of Opto-electronic Functional Materials and Micro-nano Devices Key Laboratory of Quantum State Construction and Manipulation Ministry of Education Renmin University of China Beijing100872 China
One-way functions are fundamental to classical cryptography and their existence remains a longstanding problem in computational complexity theory [1, 2]. Recently, a provable quantum one-way function has been identifi... 详细信息
来源: 评论
Sharing the Path: A Threshold Scheme from Isogenies and Error Correcting Codes
arXiv
收藏 引用
arXiv 2024年
作者: Sall, Mohamadou Anwar Hasan, M. Department of Electrical and Computer Engineering University of Waterloo Canada
In 2022, a prominent supersingular isogeny-based cryptographic scheme, namely SIDH, was compromised by a key recovery attack. However, this attack does not undermine the isogeny path problem, which remains central to ... 详细信息
来源: 评论
Improved Security Mechanism of Management Information System
Improved Security Mechanism of Management Information System
收藏 引用
The 2010 IEEE International Conference on Progress in Informatics and Computing
作者: Shewei Wang,Min Song School of Information Science and Engineering Henan University of Technology Zheng Zhou,P.R.China
To deal with database security of Management Information System(MIS),a database encryption solution is designed and *** the relation of database openness and security in the traditional model of MIS,the paper construc... 详细信息
来源: 评论
On the Formalization of Cryptographic Migration
arXiv
收藏 引用
arXiv 2024年
作者: Loebenberger, Daniel Gazdag, Stefan-Lukas Herzinger, Daniel Hirsch, Eduard Näther, Christian Steghöfer, Jan-Philipp Fraunhofer AISEC and OTH Amberg-Weiden Weiden Germany genua GmbH Kirchheim bei München Germany OTH Amberg-Weiden Weiden Germany XITASO GmbH Augsburg Germany
With the advancement of quantum computing, the transition to post-quantum cryptography (PQC) is becoming increasingly critical to maintain the security of modern dependable infrastructural systems. This paper presents... 详细信息
来源: 评论
The Evolution of Cryptography through Number Theory
arXiv
收藏 引用
arXiv 2024年
作者: Castro, Fernando Peralta Moravian University United States
Cryptography, derived from the Greek for "hidden writing," uses mathematical techniques to secure information by making it unreadable. Though the scientific study of cryptography is relatively recent, starti... 详细信息
来源: 评论
Deployment of Application on Cloud and Enhanced Data Security in Cloud Computing using ECC Algorithm
Deployment of Application on Cloud and Enhanced Data Securit...
收藏 引用
International Conference on Advanced Communication Control and Computing Technologies
作者: Neha A Puri Ajay R Karare Rajesh. C. Dharmik Department of IT YCCE Nagpur Maharshtra India Department of CSE JDCOEM Nagpur Maharashtra India
Cloud Computing is the impending need of computing which is used for the IT Industries It is one of the hottest topic in research areas. Scalibility and Flexibility increases for the computing services. Cloud Computin... 详细信息
来源: 评论