咨询与建议

限定检索结果

文献类型

  • 10 篇 会议
  • 9 篇 期刊文献

馆藏范围

  • 19 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 8 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 信息与通信工程
    • 3 篇 软件工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 生物医学工程(可授...
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 医学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 19 篇 block cipher alg...
  • 4 篇 cryptography
  • 2 篇 encryption algor...
  • 2 篇 cloud security
  • 2 篇 area cost
  • 2 篇 interconnection ...
  • 2 篇 stream cipher al...
  • 2 篇 coarse-grain rec...
  • 1 篇 high order stati...
  • 1 篇 performance
  • 1 篇 filters
  • 1 篇 reliability
  • 1 篇 internet of thin...
  • 1 篇 vlsi chip
  • 1 篇 joint watermarki...
  • 1 篇 parallelism
  • 1 篇 cmos integrated ...
  • 1 篇 hybrid descast.
  • 1 篇 power analysis a...
  • 1 篇 battery-limited ...

机构

  • 2 篇 school of microe...
  • 2 篇 department of mi...
  • 1 篇 yonsei univ sch ...
  • 1 篇 inha univ coll i...
  • 1 篇 natl crypto inst...
  • 1 篇 univ coll bahrai...
  • 1 篇 inst telecom f-2...
  • 1 篇 china automot te...
  • 1 篇 college of lnfo....
  • 1 篇 natl inst astrop...
  • 1 篇 department of so...
  • 1 篇 research center ...
  • 1 篇 natl crypto inst...
  • 1 篇 heilongjiang uni...
  • 1 篇 university colle...
  • 1 篇 department of in...
  • 1 篇 zhoukou normal u...
  • 1 篇 associate profes...
  • 1 篇 city univ hong k...
  • 1 篇 institut telecom...

作者

  • 2 篇 zibin dai
  • 2 篇 wei li
  • 2 篇 longmei nan
  • 2 篇 tongzhou qu
  • 2 篇 anqi yin
  • 1 篇 ismoyo dimas dwi...
  • 1 篇 sengupta nandita
  • 1 篇 wang lei
  • 1 篇 liu y
  • 1 篇 huang yuhua
  • 1 篇 kula kekeba tune
  • 1 篇 tong xiaojun
  • 1 篇 nahom gebeyehu z...
  • 1 篇 coatrieux g.
  • 1 篇 chinnasamy ramya
  • 1 篇 jiang ap
  • 1 篇 sheng sm
  • 1 篇 yi jaeyoung
  • 1 篇 balderas-contrer...
  • 1 篇 jiang zijing

语言

  • 18 篇 英文
  • 1 篇 中文
检索条件"主题词=block cipher algorithm"
19 条 记 录,以下是11-20 订阅
排序:
Contriving Hybrid DESCAST algorithm for Cloud Security
收藏 引用
Procedia Computer Science 2015年 54卷 47-56页
作者: Nandita Sengupta Ramya Chinnasamy University College of Bahrain Information Technology Department Manama Bahrain
Cloud computing has taken a major part in IT industry both for an individual and the organization. Primarily, it's used as infrastructure as a service, platform as a service, file storage, disaster recovery and ba... 详细信息
来源: 评论
Fully Pipelined Hardware Implementation of 128-Bit SEED block cipher algorithm
Fully Pipelined Hardware Implementation of 128-Bit SEED Bloc...
收藏 引用
5th International Workshop on Applied Reconfigurable Computing
作者: Yi, Jaeyoung Park, Karam Park, Joonseok Ro, Won W. Yonsei Univ Sch Elect & Elect Engn Seoul 120749 South Korea Inha Univ Coll Informat Technol Seoul South Korea
As the need for information security increases in our everyday life, the job of encoding/decoding for secure information delivery becomes a critical issue in data network systems. High-speed data encoding for cryptogr... 详细信息
来源: 评论
A UML 2.0 Profile to Model block cipher algorithms
收藏 引用
6th European Conference Modelling Foundations and Applications
作者: Balderas-Contreras, Tomas Rodriguez-Gomez, Gustavo Cumplido, Rene Natl Inst Astrophys Opt & Elect Comp Sci Dept Puebla 72840 Mexico
Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical information. To achieve higher performance, the... 详细信息
来源: 评论
A Joint Watermarking/Encryption algorithm for Verifying Medical Image Integrity and authenticity in Both Encrypted and Spatial Domains
A Joint Watermarking/Encryption Algorithm for Verifying Medi...
收藏 引用
33rd Annual International Conference of the IEEE Engineering-in-Medicine-and-Biology-Society (EMBS)
作者: Bouslimi, D. Coatrieux, G. Roux, Ch. Inst Telecom F-29238 Brest 3 France
In this paper, we propose a new joint watermarking/encryption algorithm for the purpose of verifying the reliability of medical images in both encrypted and spatial domains. It combines a substitutive watermarking alg... 详细信息
来源: 评论
A Joint Watermarking/Encryption algorithm for Verifying Medical Image Integrity and authenticity in Both Encrypted and Spatial Domains
A Joint Watermarking/Encryption Algorithm for Verifying Medi...
收藏 引用
Annual International Conference of the IEEE Engineering in Medicine and Biology Society
作者: D. Bouslimi G. Coatrieux Ch. Roux Institut Telecom Telecom Bretagne Unite INSERM 650 Latim Technopole Brest-Iroise
In this paper, we propose a new joint watermarking/encryption algorithm for the purpose of verifying the reliability of medical images in both encrypted and spatial domains. It combines a substitutive watermarking alg... 详细信息
来源: 评论
IMPROVEMENT OF POWER ANALYSIS ATTACKS USING KALMAN FILTER
IMPROVEMENT OF POWER ANALYSIS ATTACKS USING KALMAN FILTER
收藏 引用
IEEE International Conference on Acoustics, Speech, and Signal Processing
作者: Youssef Souissi Sylvain Guilley Jean-luc Danger Sami Mekki Guillaume Duc Institut Telecom/Telecom-ParisTech - Departement ComElec 46 rue Barrault 75634 Paris Cedex 13 France
Power analysis attacks are non intrusive and easily mounted. As a consequence, there is a growing interest in efficient implementation of these attacks against block cipher algorithms such as Data Encryption Standard ... 详细信息
来源: 评论
Precise Transformation of Feistel to SP Fuse into LFSR
收藏 引用
China Communications 2009年 第4期6卷 168-171页
作者: Luo Lan Qu Zehui Song Chaoming School of Computer Science and Technology University of Electronic Science Technology of China & National Laboratory for Modern Communications Chengdu China
For the published block cipher algorithm, two kinds of round functions have been *** ciphers in network environments are taking more risks than ever before because of their initialization key's distribution in the... 详细信息
来源: 评论
MULTI-block CHAINING-BASED AUTHENTICATION MODE
收藏 引用
Journal of Electronics(China) 2006年 第4期23卷 564-568页
作者: Huang Yuhua Hu Aiqun Zhong Ziguo Research Center of Information Security Southeast University Nanjing 210096 China College of lnfo. Science & Technology Nanjing University of Aeronautics & Astronautics Nanjing 210016 China
A fast authentication mode based on Multi-block Chaining (MBC) is put forward; and its security is proved. The MBC mode is for new generation block cipher algorithms. Its speed is about 13% faster than that of the aut... 详细信息
来源: 评论
The design and implementation of a block cipher ASIC
The design and implementation of a block cipher ASIC
收藏 引用
4th International Conference on ASIC
作者: Jiang, AP Sheng, SM Fu, YL Liu, Y Ji, LJ Peking Univ Inst Microelect Beijing 100871 Peoples R China
With the rapid progress of information technology, security becomes one of the key factors in information storage, communication and processing. For the reason of speed and security, the requirement for VLSI chips or ... 详细信息
来源: 评论