咨询与建议

限定检索结果

文献类型

  • 15 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 19 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18 篇 工学
    • 13 篇 计算机科学与技术...
    • 6 篇 电气工程
    • 4 篇 控制科学与工程
    • 3 篇 软件工程
    • 2 篇 信息与通信工程
    • 1 篇 仪器科学与技术
  • 5 篇 理学
    • 3 篇 数学
    • 2 篇 系统科学
    • 1 篇 物理学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 19 篇 shuffle algorith...
  • 3 篇 jpeg
  • 3 篇 lossless
  • 2 篇 vector-descripto...
  • 2 篇 random placement
  • 2 篇 descriptor
  • 2 篇 stochastic autom...
  • 2 篇 military chess
  • 2 篇 s-box
  • 2 篇 blowfish algorit...
  • 2 篇 computer game
  • 2 篇 large and sparse...
  • 2 篇 generalized tens...
  • 2 篇 singular systems
  • 2 篇 drazin inverse
  • 2 篇 numerical method...
  • 1 篇 csidh
  • 1 篇 system
  • 1 篇 permutation
  • 1 篇 approach

机构

  • 2 篇 guangxi normal u...
  • 2 篇 ensimag lab id i...
  • 2 篇 west visayas sta...
  • 2 篇 n carolina state...
  • 2 篇 technol inst phi...
  • 1 篇 wuhan univ sch c...
  • 1 篇 natl univ def te...
  • 1 篇 shenyang aerospa...
  • 1 篇 college of elect...
  • 1 篇 bilkent univ dep...
  • 1 篇 hunan univ coll ...
  • 1 篇 univ reading sch...
  • 1 篇 inst tecnol aero...
  • 1 篇 univ politecn va...
  • 1 篇 kocaeli univ bil...
  • 1 篇 inspur acad sci ...
  • 1 篇 bialystok tech u...
  • 1 篇 bialystok tech u...
  • 1 篇 natl univ def te...
  • 1 篇 ohio state univ ...

作者

  • 2 篇 gerardo bobby d.
  • 2 篇 medina ruji p.
  • 2 篇 sanchez e.
  • 2 篇 stewart william ...
  • 2 篇 thome n.
  • 2 篇 coll c.
  • 2 篇 wang w. y.
  • 2 篇 corpuz reynaldo ...
  • 2 篇 ginestar d.
  • 2 篇 plateau brigitte
  • 2 篇 benoit anne
  • 1 篇 jiehong wu
  • 1 篇 wang linyue
  • 1 篇 w.y wang
  • 1 篇 sondas adnan
  • 1 篇 tong kai
  • 1 篇 yang jiawei
  • 1 篇 guo yang
  • 1 篇 zhang junyi
  • 1 篇 konyar mehmet ze...

语言

  • 18 篇 英文
  • 1 篇 土耳其文
检索条件"主题词=Shuffle Algorithm"
19 条 记 录,以下是1-10 订阅
排序:
Isogeny-Based Password-Authenticated Key Exchange Based on shuffle algorithm  19th
Isogeny-Based Password-Authenticated Key Exchange Based on S...
收藏 引用
19th International Conference on Information Security Practice and Experience
作者: Peng, Congrong Peng, Cong Yang, Xiaolin Luo, Qingcai Luo, Min Wuhan Univ Sch Cyber Sci & Engn Key Lab Aerosp Informat Secur & Trusted Comp Minist Educ Wuhan Peoples R China Inspur Acad Sci & Technol Jinan Peoples R China
At CRYPTO 2022, Abdalla et al. incorporate the ability to compute the quadratic twist of elliptic curves to extend the framework of group actions introduced by Alamati et al. (ASIACRYPT 2020), and proposed two passwor... 详细信息
来源: 评论
A Lossless Compression Method for JPEG Based on shuffle algorithm
A Lossless Compression Method for JPEG Based on Shuffle Algo...
收藏 引用
International Symposium on Image Analysis and Signal Processing
作者: Wang, W. Y. Guangxi Normal Univ Coll Elect Engn Guilin Peoples R China
Universal lossless algorithms of data compression always have very little effect on JPEG data. According to the characteristic of JPEG, a new shuffle algorithm is proposed to resize the JPEG and then use the universal... 详细信息
来源: 评论
A Modified Approach of Blowfish algorithm Based On S-Box Permutation using shuffle algorithm  2018
A Modified Approach of Blowfish Algorithm Based On S-Box Per...
收藏 引用
7th International Conference on Network, Communication and Computing (ICNCC)
作者: Corpuz, Reynaldo R. Gerardo, Bobby D. Medina, Ruji P. Technol Inst Philippines 938 Aurora Blvd Quezon City 1109 Philippines West Visayas State Univ Iloilo Philippines
Blowfish algorithm has been widely analyzed and gradually accepted as a good and powerful cryptographic algorithm offering several advantages among which is suitability and efficiency for implementing hardware and sof... 详细信息
来源: 评论
State vector estimation in descriptor electrical circuits using the shuffle algorithm  19th
State vector estimation in descriptor electrical circuits us...
收藏 引用
19th Polish Control Conference (KKA)
作者: Borawski, Kamil Bialystok Tech Univ Fac Elect Engn Wiejska 45D PL-15351 Bialystok Poland
Observers for descriptor electrical circuits by the use of the shuffle algorithm are proposed. Necessary and sufficient conditions for the existence of the observers are given. The effectiveness of the proposed method... 详细信息
来源: 评论
Data Hiding Using shuffle algorithm and LSB Method  26
Data Hiding Using Shuffle Algorithm and LSB Method
收藏 引用
26th IEEE Signal Processing and Communications Applications Conference (SIU)
作者: Akbay, Kemal Konyar, Mehmet Zeki Ilkin, Sumeyya Sondas, Adnan Kocaeli Univ Bilisim Sistemleri Muhendisligi Bolumu Umuttepe Kampusu TR-41380 Kocaeli Turkey
With the development of technology, secret communication with audio, image and video files has become important. In this case, encryption and steganography play a major role. While encryption deals with uncatchable of... 详细信息
来源: 评论
Conversion of descriptor representations to state-space form: an extension of the shuffle algorithm
收藏 引用
INTERNATIONAL JOURNAL OF CONTROL 2018年 第10期91卷 2199-2213页
作者: Harrop Galvao, Roberto Kawakami Kienitz, Karl Heinz Hadjiloucas, Sillas Inst Tecnol Aeronaut Dept Elect Engn Sao Jose Dos Campos Brazil Univ Reading Sch Biol Sci Biomed Engn Reading Berks England
This paper proposes a systematic procedure for the determination of state-space models from an available descriptor representation of a linear dynamic system. The goal is to determine a state equation, a set of algebr... 详细信息
来源: 评论
A Lossless Compression Method for JPEG Based on shuffle algorithm
A Lossless Compression Method for JPEG Based on Shuffle Algo...
收藏 引用
2009图像分析与信号处理国际会议(2009 International Conference on Image Analysis and Signal Processing)
作者: W.Y Wang College of Electronic Engineering Guangxi Normal University Guilin China
Universal lossless algorithms of data compression always have very little effect on JPEG data. According to the characteristic of JPEG, a new shuffle algorithm is proposed to resize the JPEG and then use the universal... 详细信息
来源: 评论
Memory-efficient Kronecker algorithms with applications to the modelling of parallel systems
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2006年 第7期22卷 838-847页
作者: Benoit, Anne Plateau, Brigitte Stewart, William J. ENSIMAG Lab ID IMAG Antenne Montbonnot F-38330 Montbonnot St Martin France N Carolina State Univ Dept Comp Sci Raleigh NC 27695 USA
We present a new algorithm for computing the solution of large Markov chain models whose generators can be represented in the form of a generalized tensor algebra, such as networks of stochastic automata. The tensor s... 详细信息
来源: 评论
Drazin inverse based numerical methods for singular linear differential systems
收藏 引用
ADVANCES IN ENGINEERING SOFTWARE 2012年 50卷 37-43页
作者: Coll, C. Ginestar, D. Sanchez, E. Thome, N. Univ Politecn Valencia Inst Univ Matemat Multidisciplinar Valencia 46022 Spain
In this paper, numerical methods for the solution of linear singular differential system are analysed. The numerical solution of initial value problems by means of a finite difference approach and a possible implement... 详细信息
来源: 评论
SCD-PUF: shuffled Chaotic-dual-PUF With High Machine Learning Attack Resilience  8
SCD-PUF: Shuffled Chaotic-dual-PUF With High Machine Learnin...
收藏 引用
8th IEEE International Test Conference in Asia (ITC-Asia)
作者: Peng, Yijing Deng, Ding Wang, Zhenyu Guo, Yang Natl Univ Def Technol Key Lab Adv Microprocessor Chips & Syst Changsha Peoples R China Natl Univ Def Technol Coll Elect Sci & Technol Changsha Peoples R China Hunan Univ Coll Semicond Changsha Peoples R China
Physical unclonable functions (PUFs) provide a promising solution for enhancing security and device authentication. Strong PUFs can generate quantities of challenge-response pairs(CRPs) but are vulnerable to machine l... 详细信息
来源: 评论