咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 87 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 191 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 169 篇 工学
    • 110 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 54 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 17 篇 网络空间安全
    • 16 篇 软件工程
    • 8 篇 石油与天然气工程
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
  • 40 篇 理学
    • 20 篇 数学
    • 17 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 20 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 公共管理
  • 7 篇 医学
    • 4 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 191 篇 rsa algorithm
  • 36 篇 encryption
  • 30 篇 cryptography
  • 21 篇 decryption
  • 11 篇 security
  • 10 篇 public key
  • 9 篇 public key crypt...
  • 9 篇 private key
  • 8 篇 data security
  • 7 篇 cloud computing
  • 7 篇 fpga
  • 6 篇 modular multipli...
  • 6 篇 aes algorithm
  • 6 篇 steganography
  • 5 篇 image encryption
  • 5 篇 montgomery algor...
  • 5 篇 rsa
  • 5 篇 wireless sensor ...
  • 5 篇 digital signatur...
  • 4 篇 elliptic curve c...

机构

  • 3 篇 brno university ...
  • 2 篇 kongu engn coll ...
  • 2 篇 erciyes univ kay...
  • 2 篇 govt coll engn d...
  • 2 篇 heilongjiang uni...
  • 2 篇 beijing univ pos...
  • 1 篇 univ ruse angel ...
  • 1 篇 department of co...
  • 1 篇 mil univ land fo...
  • 1 篇 michigan technol...
  • 1 篇 department of co...
  • 1 篇 kluvijayawada vi...
  • 1 篇 department of co...
  • 1 篇 anhui univ inst ...
  • 1 篇 nanchang univ de...
  • 1 篇 amrita sai inst ...
  • 1 篇 rajagiri sch eng...
  • 1 篇 miracle educ soc...
  • 1 篇 computation depa...
  • 1 篇 northcap univ ma...

作者

  • 4 篇 walter cd
  • 3 篇 karthikeyan n.
  • 3 篇 eldridge se
  • 2 篇 zhao yongli
  • 2 篇 grossschädl j
  • 2 篇 karatas zekeriya...
  • 2 篇 ding qun
  • 2 篇 zhang jie
  • 2 篇 sethi dimple
  • 2 篇 yuvaraju m.
  • 2 篇 shanthi s.
  • 2 篇 liu chenglian
  • 2 篇 luy erkam
  • 1 篇 yeh sheng lih
  • 1 篇 min h
  • 1 篇 zhi-yuan li
  • 1 篇 wang d. m.
  • 1 篇 boyd c
  • 1 篇 akhtar muhammad ...
  • 1 篇 genkin daniel

语言

  • 172 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"主题词=RSA algorithm"
191 条 记 录,以下是81-90 订阅
排序:
A variant rsa acceleration with parallelisation
收藏 引用
INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS 2022年 第3期37卷 318-332页
作者: Liu, Jun-Jie Tsang, Kang-Too Deng, Yu-Hui BNU HKBU United Int Coll Div Sci & Technol Zhuhai Peoples R China Guangzhou Gaozhuan Informat Technol Ltd Guangzhou Guangdong Peoples R China
The standard rsa relies on multiple big-number modular exponentiation operations and a longer key-length is required for better protection. This imposes a hefty time penalty for encryption and decryption. In this stud... 详细信息
来源: 评论
A VERIFICATION OF BRICKELL FAST MODULAR MULTIPLICATION algorithm
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS 1990年 第3-4期33卷 153-169页
作者: WALTER, CD ELDRIDGE, SE Computation Department UMIST Manchester M60 1QD United Kingdom
This paper refers to the algorithm and its hardware implementation described by Brickell [1] for modular multiplication inN+10 clock pulses whereNis the number of bits in the binary integers involved. Brickell [1] use... 详细信息
来源: 评论
Determining the Comparative Value of Pharmaceutical Risk-Sharing Policies in Non-Small Cell Lung Cancer Using Real-World Data
收藏 引用
VALUE IN HEALTH 2019年 第3期22卷 322-331页
作者: Holleman, Marscha S. Uyl-de Groot, Carin A. Goodall, Stephen van der Linden, Naomi Erasmus Univ Inst Med Technol Assessment Erasmus Sch Hlth Policy & Management Rotterdam Netherlands Univ Technol Sydney Ctr Hlth Econ Res & Evaluat Sydney NSW Australia
Background: Risk-sharing arrangements (rsas) can be used to mitigate uncertainty about the value of a drug by sharing the financial risk between payer and pharmaceutical company. We evaluated the projected impact of a... 详细信息
来源: 评论
A FASTER MODULAR MULTIPLICATION algorithm
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS 1991年 第1-2期40卷 63-68页
作者: ELDRIDGE, SE Computation Dept UMIST Manchester M60 1QD P. O. Box 88 United Kingdom
This paper describes a method for quickly computing AB modNwhereNis odd. It is shown to have significant advantages over other algorithms which make it suitable for use in hardware for public key encryption. Such hard... 详细信息
来源: 评论
FAST MODULAR MULTIPLICATION USING 2-POWER RADIX
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS 1991年 第1-2期39卷 21-28页
作者: WALTER, CD Computation Department UMIST Manchester M60 LQD United Kingdom
Details are given here of how to generalise Brickell's fast modular multiplication algorithm to when the number representations have a general 2-power radix. Correct action depends upon the satisfaction of a compl... 详细信息
来源: 评论
Low-complexity design of bit-parallel dual-basis multiplier over GF(2m)
收藏 引用
IET INFORMATION SECURITY 2012年 第4期6卷 324-328页
作者: Wang, J. -H. Chang, H. W. Chiou, C. W. Liang, W. -Y. Natl Taipei Univ Technol Dept Comp Sci & Informat Engn Taipei 106 Taiwan Chien Hsin Univ Sci & Technol Dept Comp Sci & Informat Engn Chungli 320 Taiwan
Recently, information security is heavily dependent on cryptosystems such as Rivest-Shamir-Adleman algorithm (rsa algorithm) and elliptic curve cryptosystem (ECC). rsa can provide higher security level than ECC, but i... 详细信息
来源: 评论
Hiding Information in the DNA Sequence Using DNA Steganographic algorithms with Double-Layered Security
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY 2022年 第1期16卷 1-20页
作者: Vinodhini, R. E. Malathi, P. Amrita Sch Engn Dept Comp Sci & Engn Coimbatore Tamil Nadu India
Due to the rapid growth of the internet, data can now be stored digitally and exchanged easily by people. While sharing the data through the internet, the attackers can easily access the data. This may cause data priv... 详细信息
来源: 评论
The quantum computer for accelerating image processing and strengthening the security of information systems
收藏 引用
CHINESE JOURNAL OF PHYSICS 2023年 81卷 104-124页
作者: Nouioua, Tarek Belbachir, Ahmed Hafid Univ Tebessa Fac Exact Sci & Sci Nat & life Dept Math & Comp Sci Tebessa Algeria Univ Sci & Technol Oran Mohamed Boudiaf Fac Phys Engn Phys Dept Lab Anal & Applicat Radiat LAAR Bir El Djir Algeria
Many researchers and laboratories have been involved for many years in the development of the quantum computer. In 2019, Google has announced that they have reached quantum supremacy with their quantum computer Sycamo... 详细信息
来源: 评论
An Enhanced and Secured rsa Key Generation Scheme (ESRKGS)
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2015年 第Feb.期20卷 3-10页
作者: Thangavel, M. Varalakshmi, P. Murrali, Mukund Nithya, K. Anna Univ Dept Informat Technol Madras 600044 Tamil Nadu India
Public-key cryptography can be claimed as the greatest and an excellent revolution in the field of cryptography. A public-key cryptosystem is used for both confidentiality and authentication. One such public-key crypt... 详细信息
来源: 评论
A new serial/parallel architecture for a low power modular multiplier
A new serial/parallel architecture for a low power modular m...
收藏 引用
16th International-Federation-for-Information-Processing World Computer Congress (IFIP 2000)/Annual Conference of TC11 (SEC 2000)
作者: Grossschädl, J Graz Univ Technol Inst Appl Informat Proc & Commun IAIK A-8010 Graz Austria
A new architecture for a modular multiplier is introduced that allows the efficient implementation of a low-power crypto coprocessor for smartcards. The multiplier architecture is optimized for accelerating asymmetric... 详细信息
来源: 评论