咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 87 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 191 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 169 篇 工学
    • 110 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 54 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 17 篇 网络空间安全
    • 16 篇 软件工程
    • 8 篇 石油与天然气工程
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
  • 40 篇 理学
    • 20 篇 数学
    • 17 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 20 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 公共管理
  • 7 篇 医学
    • 4 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 191 篇 rsa algorithm
  • 36 篇 encryption
  • 30 篇 cryptography
  • 21 篇 decryption
  • 11 篇 security
  • 10 篇 public key
  • 9 篇 public key crypt...
  • 9 篇 private key
  • 8 篇 data security
  • 7 篇 cloud computing
  • 7 篇 fpga
  • 6 篇 modular multipli...
  • 6 篇 aes algorithm
  • 6 篇 steganography
  • 5 篇 image encryption
  • 5 篇 montgomery algor...
  • 5 篇 rsa
  • 5 篇 wireless sensor ...
  • 5 篇 digital signatur...
  • 4 篇 elliptic curve c...

机构

  • 3 篇 brno university ...
  • 2 篇 kongu engn coll ...
  • 2 篇 erciyes univ kay...
  • 2 篇 govt coll engn d...
  • 2 篇 heilongjiang uni...
  • 2 篇 beijing univ pos...
  • 1 篇 univ ruse angel ...
  • 1 篇 department of co...
  • 1 篇 mil univ land fo...
  • 1 篇 michigan technol...
  • 1 篇 department of co...
  • 1 篇 kluvijayawada vi...
  • 1 篇 department of co...
  • 1 篇 anhui univ inst ...
  • 1 篇 nanchang univ de...
  • 1 篇 amrita sai inst ...
  • 1 篇 rajagiri sch eng...
  • 1 篇 miracle educ soc...
  • 1 篇 computation depa...
  • 1 篇 northcap univ ma...

作者

  • 4 篇 walter cd
  • 3 篇 karthikeyan n.
  • 3 篇 eldridge se
  • 2 篇 zhao yongli
  • 2 篇 grossschädl j
  • 2 篇 karatas zekeriya...
  • 2 篇 ding qun
  • 2 篇 zhang jie
  • 2 篇 sethi dimple
  • 2 篇 yuvaraju m.
  • 2 篇 shanthi s.
  • 2 篇 liu chenglian
  • 2 篇 luy erkam
  • 1 篇 yeh sheng lih
  • 1 篇 min h
  • 1 篇 zhi-yuan li
  • 1 篇 wang d. m.
  • 1 篇 boyd c
  • 1 篇 akhtar muhammad ...
  • 1 篇 genkin daniel

语言

  • 172 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"主题词=RSA algorithm"
191 条 记 录,以下是1-10 订阅
排序:
Encryption and Decryption Using rsa algorithm and Moore-Penrose Inverse  3rd
Encryption and Decryption Using RSA Algorithm and Moore-Penr...
收藏 引用
3rd International Conference on Network Security and Blockchain Technology
作者: Gogoi, Sarbani Paul, Somnath Tezpur Univ Napaam 784028 Assam India
Cryptography incorporates application and scientific examination of methodologies aimed at facilitating secure communication in the face of potentially threatening behavior. In a broader sense, cryptography refers to ... 详细信息
来源: 评论
A visually secure asymmetric image encryption scheme based on rsa algorithm and hyperchaotic map
收藏 引用
PHYSICA SCRIPTA 2020年 第3期95卷 035223-035223页
作者: Xu, Qiaoyun Sun, Kehui Zhu, Congxu Cent South Univ Sch Phys & Elect Changsha 410083 Hunan Peoples R China Cent South Univ Sch Comp Sci & Engn Changsha 410083 Hunan Peoples R China
This paper proposes a visually secure asymmetric image encryption scheme based on Rivest-Shamir-Adlemen (rsa) algorithm and hyperchaotic map. It combines the advantages of the rsa and chaos-based image encryption algo... 详细信息
来源: 评论
Design optimization of a high-speed, area-efficient and low-power Montgomery modular multiplier for rsa algorithm
收藏 引用
IEICE TRANSACTIONS ON ELECTRONICS 2005年 第4期E88C卷 576-581页
作者: Masui, S Mukaida, K Takenaka, M Torii, N Fujitsu Labs Ltd Kawasaki Kanagawa 2118588 Japan Fujitsu Ltd Kawasaki Kanagawa 2118588 Japan
High-speed, area-efficient, and low-power Montgomery modular multipliers for rsa algorithm have been developed for digital signature and user authentication in high-speed network systems and smart card LSIs. The multi... 详细信息
来源: 评论
A summary of feature selection techniques for gene chip in bioinformatics based on rsa algorithm
收藏 引用
INTERNATIONAL JOURNAL OF NANOTECHNOLOGY 2022年 第6-11期19卷 938-947页
作者: Li, Xiaohua Yang, Siyu Hunan Univ Arts & Sci Sch Phys Educ Changde 415000 Hunan Peoples R China
With the implementation of the human genome project, computational intelligence has been widely used in computational biology and bioinformatics. The purpose of this study is to study the feature selection technique o... 详细信息
来源: 评论
Encryption and decryption of signed graph matrices through rsa algorithm
收藏 引用
INDIAN JOURNAL OF PURE & APPLIED MATHEMATICS 2024年 第4期55卷 1477-1484页
作者: Wardak, Obaidullah Sinha, Deepa Sethi, Anshu South Asian Univ Math Delhi 110068 India NorthCap Univ Math Gurugram 122017 Haryana India
Information security and confidentiality are burning issues in today's digitally connected world. Encryption is considered a fast-moving trend in this reference. Although we see rigorous enhancements in the develo... 详细信息
来源: 评论
An optical image compression and encryption scheme based on compressive sensing and rsa algorithm
收藏 引用
OPTICS AND LASERS IN ENGINEERING 2019年 121卷 169-180页
作者: Gong, Lihua Qiu, Kaide Deng, Chengzhi Zhou, Nanrun Nanchang Univ Dept Elect Informat Engn Nanchang 330031 Jiangxi Peoples R China Univ Pittsburgh Dept Elect & Comp Engn Pittsburgh PA 15261 USA Jiangxi Prov Key Lab Water Informat Cooperat Sens Nanchang 330099 Jiangxi Peoples R China
Most of the image encryption algorithms are the private-key cryptosystem, in which the encryption process and the decryption process employ the same keys. To enhance the security of image encryption system, an optical... 详细信息
来源: 评论
A Modified Technique for Reliable Image Encryption Method using Merkle-Hellman Cryptosystem and rsa algorithm
收藏 引用
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY 2015年 第3期18卷 293-300页
作者: Lokeshwari, G. Susarla, Sreevidya Kumar, S. Udaya Geethanjali Coll Engn & Technol CSE Dept Cheeryal Keesara India Chaitanya Bharathi Inst Technol Comp Sci & Engn Hyderabad Andhra Pradesh India Geethanjali Coll Engn & Technol Cheeryal Keesara India
The great advances in digital data communication have led to high desire for a secured and reliable transmission. Advances in satellite communication like packet radio technology and the development of high speed LAN&... 详细信息
来源: 评论
The Hardware-Based PKCS#11 Standard using the rsa algorithm
收藏 引用
IEEE LATIN AMERICA TRANSACTIONS 2009年 第2期7卷 160-169页
作者: Muzzi, F. A. Chiaramonte, R. B. Moreno, E. D. LSI TEC Sao Paulo Brazil Ctr Univ Euripides Marilia UNIVEM Marilia SP Brazil Univ Fed Sergipe Depto Computacao DCOMP UFS Aracaju Brazil
In this paper, we have proposed and implemented a hardware-based security system, which executes rsa-based cryptography operations by using the PKCS#11 standard. It was implemented in C, VHDL and FPGAs and it is modul... 详细信息
来源: 评论
An Information Fusion approach based on prime numbers coming from rsa algorithm and Fractals for secure coding
收藏 引用
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY 2015年 第5期18卷 455-479页
作者: Iovane, G. Amorosia, A. Benedetto, E. Lamponi, G. Univ Salerno Dipartimento Informat Salerno Italy Univ Salerno Salerno Italy Univ Messina Messina Italy
In the present paper we will show a system to realize an innovative cryptographic code that ensures a high level of security using Information Fusion (IF) techniques. In detail, we have decided to merge two codes resp... 详细信息
来源: 评论
Optimization of AES and rsa algorithm and Its Mixed Encryption System  13th
Optimization of AES and RSA Algorithm and Its Mixed Encrypti...
收藏 引用
13th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
作者: Liu, Jia Fan, Chunlei Tian, Xingyu Ding, Qun Heilongjiang Univ Elect Engn Coll Harbin Heilongjiang Peoples R China
An improved key expansion method is proposed to improve the security performance in AES key expansion. There is large difference of operation time between Mixcolumns and Inverse Mixcolumns, we propose the simplest for... 详细信息
来源: 评论