咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是61-70 订阅
排序:
The Smart and Secured Communication Using Applied Cryptography algorithms  5th
The Smart and Secured Communication Using Applied Cryptograp...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Agarwal, Trapty Jebakumari, S. Adlin Hemlata Ayesha, Amreen Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Department of Computer Science and Information Technology Jain University Karnataka Bangalore India Department of Computer Science & Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Manduwala Dehradun Navgaon India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India
This paper describes the implementation of a at ease communication device the usage of an implemented cryptography algorithm. The gadget is designed to provide comfy statistics and voice communique between endpoints u... 详细信息
来源: 评论
Implementing Cryptographic algorithms for Securing Online Transactions  5th
Implementing Cryptographic Algorithms for Securing Online Tr...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Bhuvana, J. Bhatt, Rahul Metre, Prakash B. Mishra, Awakash Karnataka Bangalore India Department of Computer Science and Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India
Cryptographic algorithms are critical in securing online transactions. They provide relaxed verbal exchange channels for fairly touchy statistics that wishes to be reliably transmitted among a couple of remote events.... 详细信息
来源: 评论
Performance Comparison: Software vs. Hardware Implementation of Novel S-Box Designed to Resist Power Analysis Attack
Performance Comparison: Software vs. Hardware Implementation...
收藏 引用
International Conference on Applications in Electronics Pervading Industry, Environment and Society, APPLEPIES 2024
作者: Mirigaldi, Mattia Martina, Maurizio Masera, Guido Politecnico di Torino Turin Italy
The Advanced encryption Standard (AES) is the only approved symmetric encryption algorithm by security agencies such as the National Institute of Standards and Technology (NIST). The algorithm is designed to be fast a... 详细信息
来源: 评论
Research on identification of domestic commercial block cipher algorithms based on deep learning  4
Research on identification of domestic commercial block ciph...
收藏 引用
4th International Conference on Computer Vision, Application, and Algorithm, CVAA 2024
作者: Li, Li Chen, Jun School of Computer Science Chengdu University of Information Technology 24 Block 1 Xuefu Road Chengdu610225 China
With the widespread application of domestic commercial cryptographic algorithms and the advancement of commercial cryptographic application evaluation, the compliance of these algorithms has garnered significant atten... 详细信息
来源: 评论
AESHA3: Efficient and Secure Sub-Key Generation for AES Using SHA-3  14th
AESHA3: Efficient and Secure Sub-Key Generation for AES Us...
收藏 引用
14th EAI International Conference on Broadband Communications, Networks, and Systems, BROADNETS 2024
作者: Soni, Ankush Sahay, Sanjay K. Mehta, Parit Department of Computer Science and Information Systems BITS Pilani K. K. Birla Goa Campus Zuarinagar India
Advanced encryption Standard (AES) is one of the most widely used symmetric cipher for the confidentiality of data. Also it is used for other security services, viz. integrity, authentication and key establishment. Ho... 详细信息
来源: 评论
Bit-Security Preserving Hardness Amplification  22nd
Bit-Security Preserving Hardness Amplification
收藏 引用
22nd Theory of Cryptography Conference, TCC 2024
作者: Watanabe, Shun Yasunaga, Kenji Tokyo University of Agriculture and Technology Tokyo Japan Institute of Science Tokyo Tokyo Japan
Hardness amplification is one of the important reduction techniques in cryptography, and it has been extensively studied in the literature. The standard XOR lemma known in the literature evaluates the hardness in... 详细信息
来源: 评论
Bit Security: Optimal Adversaries, Equivalence Results, and a Toolbox for Computational-Statistical Security Analysis  22nd
Bit Security: Optimal Adversaries, Equivalence Results, and...
收藏 引用
22nd Theory of Cryptography Conference, TCC 2024
作者: Micciancio, Daniele Schultz-Wu, Mark University of California San Diego United States
We investigate the notion of bit-security for decisional cryptographic properties, as originally proposed in (Micciancio & Walter, Eurocrypt 2018), and its main variants and extensions, with the goal clarifying th... 详细信息
来源: 评论
Detection of Unknown Darknet Traffic with Random Forest  16th
Detection of Unknown Darknet Traffic with Random Forest
收藏 引用
16th International Conference on Genetic and Evolutionary Computing, ICGEC 2024
作者: Lee, Dong-Yu Nguyen, Thanh-Lam Shieh, Chin-Shiuh Horng, Mong-Fong Tsai, Casper Miu, Denis National Kaohsiung University of Science and Technology Kaohsiung Taiwan Auray Technology Corp. Taoyuan Taiwan Genie Networks Ltd. Taipei Taiwan
Darknet refers to an overlay network that requires the use of special software to access. Tor (The Onion Router) is one of the software used to access the darknet. Tor uses unique routing methods and encryption algori... 详细信息
来源: 评论
Secure Composition of Quantum Key Distribution and Symmetric Key encryption
arXiv
收藏 引用
arXiv 2025年
作者: Dey, Kunal Safavi-Naini, Reihaneh University of Calgary AB Canada
Quantum key distribution (QKD) allows Alice and Bob to share a secret key over an insecure channel with proven information-theoretic security against an adversary whose strategy is bounded only by the laws of physics.... 详细信息
来源: 评论
Reducing the Share Size of Weighted Threshold Secret Sharing Schemes via Chow Parameters Approximation  22nd
Reducing the Share Size of Weighted Threshold Secret Shari...
收藏 引用
22nd Theory of Cryptography Conference, TCC 2024
作者: Farràs, Oriol Guiot, Miquel Universitat Rovira i Virgili Tarragona Spain
A secret sharing scheme is a cryptographic primitive that allows a dealer to share a secret among a set of parties, so that only authorized subsets of them can recover it. The access structure of the scheme is the fam... 详细信息
来源: 评论