咨询与建议

限定检索结果

文献类型

  • 1 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 电气工程
    • 1 篇 控制科学与工程

主题

  • 2 篇 secure hash algo...
  • 1 篇 data security
  • 1 篇 optical, image a...
  • 1 篇 medical informat...
  • 1 篇 computer vision ...
  • 1 篇 hash value
  • 1 篇 medical service ...
  • 1 篇 4-dimensional hy...
  • 1 篇 international de...
  • 1 篇 medical informat...
  • 1 篇 dna sequence
  • 1 篇 open-source medi...
  • 1 篇 dna
  • 1 篇 number theoretic...
  • 1 篇 high dimensional...
  • 1 篇 dna encoding val...
  • 1 篇 obvious encrypti...
  • 1 篇 sha-3 algorithm
  • 1 篇 medical images
  • 1 篇 information shar...

机构

  • 1 篇 peking univ peop...
  • 1 篇 univ chinese aca...
  • 1 篇 castest peoples ...
  • 1 篇 binary semi co l...
  • 1 篇 luoyang inst sci...
  • 1 篇 lushi chinese me...
  • 1 篇 harbin engn univ...
  • 1 篇 chinese acad sci...
  • 1 篇 henan univ sci &...

作者

  • 1 篇 pan shuaihao
  • 1 篇 cai min
  • 1 篇 mu jianan
  • 1 篇 ji zhihang
  • 1 篇 ye jing
  • 1 篇 li mingzhen
  • 1 篇 li huawei
  • 1 篇 meng weiming
  • 1 篇 tan huajie
  • 1 篇 chen shuai
  • 1 篇 wang lin
  • 1 篇 wang guoyong
  • 1 篇 li xiaowei

语言

  • 2 篇 英文
检索条件"主题词=Secure Hash Algorithm 3"
2 条 记 录,以下是1-10 订阅
排序:
Medical image encryption algorithm based on hyper-chaotic system and DNA coding
收藏 引用
COGNITIVE COMPUTATION AND SYSTEMS 2022年 第4期4卷 378-390页
作者: Li, Mingzhen Pan, Shuaihao Meng, Weiming Wang Guoyong Ji, Zhihang Wang, Lin Henan Univ Sci & Technol Sch Informat Engn Luoyang Peoples R China Lushi Chinese Med Hosp Sanmenxia Peoples R China Harbin Engn Univ Sch Comp Harbin Peoples R China Luoyang Inst Sci & Technol Sch Comp & Informat Engn Luoyang 471023 Peoples R China
With the international development of the medical service informatisation, medical information sharing has become the key standard to measure the degree of medical informatisation. In this process, it is important to ... 详细信息
来源: 评论
Configurable and High-level Pipelined Lattice-based Post Quantum Cryptography Hardware Accelerator Design  32
Configurable and High-level Pipelined Lattice-based Post Qua...
收藏 引用
32nd IEEE Asian Test Symposium (ATS)
作者: Mu, Jianan Tan, Huajie Chen, Shuai Cai, Min Ye, Jing Li, Huawei Li, Xiaowei Chinese Acad Sci Inst Comp Technol State Key Lab Proc Beijing Peoples R China Univ Chinese Acad Sci Beijing Peoples R China CASTEST Beijing Peoples R China Peking Univ Beijing Peoples R China Binary Semi Co Ltd Changsha Peoples R China
Number Theoretic Transform (NTT) and secure hash algorithm 3 (SHA3), are the two main operators in the lattice-based Post-Quantum Cryptography (PQC) algorithms. Lattice-based PQC algorithms have different parameter se... 详细信息
来源: 评论