咨询与建议

限定检索结果

文献类型

  • 8 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 10 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 6 篇 电气工程
    • 6 篇 计算机科学与技术...
    • 3 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 1 篇 动力工程及工程热...
    • 1 篇 控制科学与工程
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 10 篇 advanced encrypt...
  • 3 篇 cryptography
  • 2 篇 internet of thin...
  • 2 篇 table lookup
  • 1 篇 cryptographic al...
  • 1 篇 reconfigurable f...
  • 1 篇 assembly instruc...
  • 1 篇 secure multiplic...
  • 1 篇 security threats
  • 1 篇 trust based fog ...
  • 1 篇 optimal secret k...
  • 1 篇 data processing
  • 1 篇 two-dimensional ...
  • 1 篇 decryptor
  • 1 篇 deep learning
  • 1 篇 2d chebyshev map
  • 1 篇 secure inversion
  • 1 篇 computer archite...
  • 1 篇 digital signal p...
  • 1 篇 columns higher-o...

机构

  • 1 篇 pvpsit vijayawad...
  • 1 篇 sathyabama inst ...
  • 1 篇 aligarh muslim u...
  • 1 篇 vasireddy venkat...
  • 1 篇 school of comput...
  • 1 篇 tech mahindra lt...
  • 1 篇 department of el...
  • 1 篇 kalasalingam aca...
  • 1 篇 hunan prov key l...
  • 1 篇 hengyang normal ...
  • 1 篇 department of it...
  • 1 篇 inst politecn na...
  • 1 篇 univ roma tor ve...
  • 1 篇 hunan normal uni...
  • 1 篇 shijiazhuang tie...
  • 1 篇 amity univ amity...

作者

  • 1 篇 re m.
  • 1 篇 murugan b. s.
  • 1 篇 negi mukesh chan...
  • 1 篇 pontarelli s.
  • 1 篇 fazzolari r.
  • 1 篇 nirmala e.
  • 1 篇 di nunzio l.
  • 1 篇 ou yu
  • 1 篇 sanchez giovanny
  • 1 篇 saravanan d.
  • 1 篇 vazquez eduardo
  • 1 篇 maragatharajan m...
  • 1 篇 francis saviour ...
  • 1 篇 luqman mohammad
  • 1 篇 sree t. krishna
  • 1 篇 anides esteban
  • 1 篇 salsano a.
  • 1 篇 nath seema
  • 1 篇 som subhranil
  • 1 篇 avalos juan-gera...

语言

  • 9 篇 英文
  • 1 篇 其他
检索条件"主题词=advanced encryption standard algorithm"
10 条 记 录,以下是1-10 订阅
排序:
Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map
收藏 引用
IET INFORMATION SECURITY 2013年 第4期7卷 265-270页
作者: Li, Jianhua Liu, Hui Shijiazhuang TieDao Univ Sch Informat Sci & Technol Shijiazhuang Peoples R China
In this study, a novel scheme of advanced encryption standard (AES) is proposed. Its independent round key is generated by the two-dimensional (2D) Henon map and the 2D Chebyshev map. The goal is to improve the low se... 详细信息
来源: 评论
A low-cost and highly compact FPGA-based encryption/decryption architecture for AES algorithm
收藏 引用
IEEE LATIN AMERICA TRANSACTIONS 2021年 第9期19卷 1443-1450页
作者: Equihua, Christian Anides, Esteban Garcia, Luis Vazquez, Eduardo Sanchez, Gabriel Avalos, Juan-Gerardo Sanchez, Giovanny Inst Politecn Nacl ESIME Culhuacan Ciudad De Mexico Mexico
Nowadays, the design of ultra-compact area advanced encryption standard (AES) architectures is highly demanded by the electronics industry since many of these architectures are embedded in portable devices, such as sm... 详细信息
来源: 评论
Low Area FPGA Implementation of AES Architecture with EPRNG for IoT Application
收藏 引用
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS 2022年 第2期38卷 181-193页
作者: Siva Balan, N. Murugan, B. S. Kalasalingam Acad Res & Educ Dept CSE Srivilliputtur 626128 Tamil Nadu India
Nowadays, the Internet of Things (IoT) is widely used in the daily lives of humans, which range from tiny wearable devices to huge industrial systems. However, designing the IoT application is difficult, because the d... 详细信息
来源: 评论
Secure data transmission in wireless networking through node deployment and Artificial Bird optimized deep learning network
收藏 引用
TELECOMMUNICATION SYSTEMS 2024年 第4期87卷 1067-1086页
作者: Luqman, Mohammad Faridi, Arman Rasool Aligarh Muslim Univ Dept Comp Sci Aligarh India
In the wireless sensor network (WSN), ensuring secure routing in the network is a crucial and critical task. Providing security and sustaining energy is still a difficult problem in the research community, despite the... 详细信息
来源: 评论
Enhancing Security Using Secure Authentication Model in Fog Computing Model
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2023年 第2期130卷 909-933页
作者: Satheesh, Kavuri K. S. V. A. Sree, T. Krishna Vasireddy Venkatadri Inst Technol Guntur 522508 Andhra Pradesh India PVPSIT Vijayawada India
Fog computing network plays a significant role in enhancing the communication between the end users and the cloud server accompanying high security. The quality of service of the systems could be greatly enhanced by t... 详细信息
来源: 评论
Research on a high-order AES mask anti-power attack
收藏 引用
IET INFORMATION SECURITY 2020年 第5期14卷 580-586页
作者: Ou, Yu Li, Lang Hunan Normal Univ Coll Informat Sci & Engn Changsha 410081 Peoples R China Hunan Prov Key Lab Intelligent Informat Proc & Ap Hengyang 421002 Peoples R China Hengyang Normal Univ Coll Comp Sci & Technol Hengyang 421002 Peoples R China
The cryptographic algorithm has been gradually improved in design, but its implementations are vulnerable to side-channel analysis (SCA). Generally speaking, adding a mask to the primitive is the best way to counterac... 详细信息
来源: 评论
Cryptanalysis of a novel bitwise XOR rotational algorithm and security for IoT devices
收藏 引用
INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS 2021年 第1期25卷 139-147页
作者: Nath, Seema Som, Subhranil Negi, Mukesh Chandra Amity Univ Amity Inst Informat Technol Noida Uttar Pradesh India Tech Mahindra Ltd Pune Maharashtra India
The internet of things (IoT) is a multiple devices, which connects with the internet for communication, in order to obtain the updated from the cloud. The fog can act as a controller and it is located between the IoT ... 详细信息
来源: 评论
An improved secure file deduplication avoidance using CKHO based deep learning model in a cloud environment
收藏 引用
JOURNAL OF SUPERCOMPUTING 2022年 第13期78卷 14892-14918页
作者: Mageshkumar, N. Lakshmanan, L. Sathyabama Inst Sci & Technol Dept Comp Sci & Engn Chennai 600119 Tamil Nadu India
Data deduplication is a process that gets rid of excessive duplicates of data and minimizes the storage capacity to a large extent. This process mainly optimizes redundancies without compromising the data fidelity or ... 详细信息
来源: 评论
Implementation of the AES algorithm Using a Reconfigurable Functional Unit
Implementation of the AES Algorithm Using a Reconfigurable F...
收藏 引用
10th International Symposium on Signals, Circuits and Systems (ISSCS)
作者: Cardarilli, G. C. Di Nunzio, L. Fazzolari, R. Pontarelli, S. Re, M. Salsano, A. Univ Roma Tor Vergata I-00133 Rome Italy
Nowadays programmable devices (microprocessors and DSPs) are based on complex architectures optimized for obtaining maximum speed performances that degrades when the implemented application is mostly based on operatio... 详细信息
来源: 评论
A Comparison of Cloud Security Mechanisms  2
A Comparison of Cloud Security Mechanisms
收藏 引用
2nd International Conference on Automation, Computing and Renewable Systems, ICACRS 2023
作者: Saravanan, D. Maragatharajan, M. Nirmala, E. Naveen, P. Francis Saviour Devaraj, A. School of Computing Science and Engineering VIT Bhopal University Madhya Pradesh Kothrikalan India Department of Electrical and Electronics Engnieering KPR Institute of Engineering and Technology Tamil Nadu Coimbatore India Department of IT College of Computing & Information Sciences University of Technology and Applied Sciences Ibri Oman
Cloud computing is a broad term that can be understood differently depending on the context. Its primary goal is to reduce capital expenses on infrastructure, operating systems, deployment, and storage. The National I... 详细信息
来源: 评论