咨询与建议

限定检索结果

文献类型

  • 281 篇 会议
  • 105 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 336 篇 工学
    • 287 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 107 篇 信息与通信工程
    • 88 篇 控制科学与工程
    • 86 篇 电气工程
    • 52 篇 网络空间安全
    • 32 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 24 篇 交通运输工程
    • 24 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 137 篇 理学
    • 90 篇 数学
    • 42 篇 物理学
    • 16 篇 统计学(可授理学、...
    • 15 篇 化学
    • 11 篇 系统科学
  • 61 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 391 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 data security
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 79 篇 其他
  • 6 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
391 条 记 录,以下是51-60 订阅
Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Smooth Twins and Their Isogeny-Based Applications  31st
Towards Optimally Small Smoothness Bounds for Cryptographic...
收藏 引用
31st International Conference on Selected Areas in Cryptography, SAC 2024
作者: Sterner, Bruno Institut Polytechnique de Paris Palaiseau France
We give a new approach for finding large smooth twins. Those twins whose sum is a prime are of interest in the parameter setup of certain isogeny-based cryptosystems such as SQIsign. The approach to find such twins is... 详细信息
来源: 评论
An Improved Algorithm for Code Equivalence  16th
An Improved Algorithm for Code Equivalence
收藏 引用
16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025
作者: Nowakowski, Julian Ruhr University Bochum Bochum Germany
We study the linear code equivalence problem (LEP) for linear [n, k]-codes over finite fields Fq. Recently, Chou, Persichetti and Santini gave an elegant algorithm that solves LEP over large finite fiel... 详细信息
来源: 评论
Post-Quantum Backdoor for Kyber-KEM  31st
Post-Quantum Backdoor for Kyber-KEM
收藏 引用
31st International Conference on Selected Areas in Cryptography, SAC 2024
作者: Xia, Wenwen Wang, Geng Gu, Dawu School of Cyber Engineering Xidian University Xi’an710071 China Lab of Cryptology and Computer Security Shanghai Jiao Tong University Shanghai200240 China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai200240 China
Kleptography, also known as cryptographic backdoor, poses a significant threat to cryptographic algorithms by clandestinely embedding a backdoor through the use of another cryptographic algorithm, often leveraging pub... 详细信息
来源: 评论
A Univariate Attack Against the Limited-Data Instance of Ciminion  31st
A Univariate Attack Against the Limited-Data Instance of C...
收藏 引用
31st International Conference on Selected Areas in Cryptography, SAC 2024
作者: Bariant, Augustin Inria Paris France ANSSI Paris France
With the increasing interest for advanced protocols for Multi-Party Computation, Fully-Homomorphic encryption or Zero-Knowledge proofs, a need for cryptographic algorithms with new constraints has emerged. These algor... 详细信息
来源: 评论
A Novel Key Generation Algorithm Utilizing Lattice-Based Cryptography Principles  3rd
A Novel Key Generation Algorithm Utilizing Lattice-Based Cry...
收藏 引用
3rd International Conference on Computing and Communication Networks, ICCCN 2023
作者: Arul, Rajakumar Sivaselvam, B. Choudhary, Ankush Centre for Smart Grid Technologies Vellore Institute of Technology Chennai India Department of Computer Science and Engineering IIITDM Kancheepuram Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India
Technology advancement is inevitable, and it has created a revolution in all the sectors creating huge opportunities. Artificial intelligence and machine learning have boosted the advancement of all the sectors making... 详细信息
来源: 评论
Area and Power Efficient Modified Karatsuba Multiplier for Error-Free Cryptography algorithms  1
Area and Power Efficient Modified Karatsuba Multiplier for E...
收藏 引用
1st International Conference on Intelligent Systems and Computational Networks, ICISCN 2025
作者: Neelima, K. Hemalatha, Kanumuri Bhavana, Nagella Karthik, Parapu Kumar, Satrapu Sai Mohan Babu University Erstwhile Sree Vidyanikethan Engineering College Department of Ece Tirupati India Sree Vidyanikethan Engineering College Department of Ece Tirupati India
Data security and authentication are critical in cryptography, especially in elliptic curve cryptography (ECC), where usage of efficient finite field multipliers becomes essential. However, these multipliers consume s... 详细信息
来源: 评论
ECPM Cryptanalysis Resource Estimation  25th
ECPM Cryptanalysis Resource Estimation
收藏 引用
25th International Conference on Information Security Applications, WISA 2024
作者: Putranto, Dedy Septono Catur Wardhani, Rini Wisnu Cho, Jaehan Kim, Howon IoT Research Center Pusan National University Busan609735 Korea Republic of Blockchain Platform Research Center Pusan National University Busan609735 Korea Republic of South Korea School of Computer Science and Engineering Pusan National University Busan609735 Korea Republic of
Elliptic Curve Point Multiplication (ECPM) is a key component of the Elliptic Curve Cryptography (ECC) hierarchy protocol. However, the specific estimation of resources required for this process remains underexplored ... 详细信息
来源: 评论
Efficient Theta-Based algorithms for Computing (,)-Isogenies on Kummer Surfaces for Arbitrary Odd  16th
Efficient Theta-Based Algorithms for Computing (,)-Isogenie...
收藏 引用
16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025
作者: Yoshizumi, Ryo Onuki, Hiroshi Ohashi, Ryo Kudo, Momonari Nuida, Koji Kyushu University Fukuoka Japan The University of Tokyo Tokyo Japan Fukuoka Institute of Technology Fukuoka Japan National Institute of Advanced Industrial Science and Technology Tokyo Japan
Isogeny-based cryptography is one of the candidates for post-quantum cryptography. Recently, several isogeny-based cryptosystems using isogenies between Kummer surfaces were proposed. Most of those cryptosystems use (... 详细信息
来源: 评论
Lightweight security Mechanism for IoT Applications using Substitution-Box  4
Lightweight security Mechanism for IoT Applications using Su...
收藏 引用
4th IEEE International Conference on Artificial Intelligence in Cybersecurity, ICAIC 2025
作者: Hanif, Fozia Shams, Rehan Waheed, Urooj University of Karachi Department of Mathematics Karachi Pakistan Sir Syed University of Engineering and Technology Karachi Department of Telecommunication Pakistan DHA Suffa University Karachi Department of Computer Science Pakistan
In recent times the use of small computing devices for gathering information from the real world is increasing day by day. The devices like wireless sensors, RIFD tags, embedded devices and IoT devices are required to... 详细信息
来源: 评论
An Asymmetric Single Channel encryption Mechanism Using Unequal Modulus and QZS Algorithm in Fractional Fourier Transform  1st
An Asymmetric Single Channel Encryption Mechanism Using Uneq...
收藏 引用
1st International Conference on Innovation and Emerging Trends in Computing and Information Technologies, IETCIT 2024
作者: Rakheja, Pankaj Kashyap, Neeti The NorthCap University Gurugram India
The proposed cipher mechanism entails the encryption of a three - channel coloured input image into a single-channel encrypted image by means of QZS algorithm. Initially R, G and B components are processed parallelly,... 详细信息
来源: 评论