咨询与建议

限定检索结果

文献类型

  • 50 篇 会议
  • 32 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 84 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 57 篇 计算机科学与技术...
    • 33 篇 电气工程
    • 22 篇 信息与通信工程
    • 11 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 3 篇 石油与天然气工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
  • 7 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 6 篇 理学
    • 5 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 3 篇 医学
    • 2 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 84 篇 cryptographic al...
  • 12 篇 cryptography
  • 11 篇 security
  • 7 篇 encryption
  • 5 篇 fpga
  • 4 篇 throughput
  • 4 篇 aes
  • 4 篇 smart grid
  • 3 篇 power grid
  • 3 篇 wide-area monito...
  • 3 篇 block cipher
  • 3 篇 rsa
  • 3 篇 decryption
  • 3 篇 cloud computing
  • 3 篇 scheduling
  • 3 篇 digital signatur...
  • 2 篇 application spec...
  • 2 篇 data security
  • 2 篇 access control
  • 2 篇 cipher

机构

  • 3 篇 univ chinese aca...
  • 2 篇 loyola univ mary...
  • 2 篇 science and tech...
  • 2 篇 kookmin univ dep...
  • 2 篇 brno university ...
  • 2 篇 chinese acad sci...
  • 2 篇 tsinghua univ in...
  • 2 篇 univ chile dept ...
  • 1 篇 univ cooperat co...
  • 1 篇 dept. of compute...
  • 1 篇 elect & telecomm...
  • 1 篇 al maarif univ c...
  • 1 篇 delhi technical ...
  • 1 篇 hiroshima univ r...
  • 1 篇 chinese acad sci...
  • 1 篇 chinese acad sci...
  • 1 篇 sci & technol co...
  • 1 篇 tsinghua univ ts...
  • 1 篇 dept.of computer...
  • 1 篇 electrical engin...

作者

  • 2 篇 li zerun
  • 2 篇 zhang lei
  • 2 篇 baloian nelson
  • 2 篇 chakraborty moum...
  • 2 篇 yun seunghwan
  • 2 篇 budko mikhail
  • 2 篇 wu liji
  • 2 篇 kuhn d. richard
  • 2 篇 yi okyeon
  • 2 篇 saha debasri
  • 2 篇 qiu meikang
  • 2 篇 zhang xiangmin
  • 2 篇 liu rui
  • 2 篇 chakrabarti amla...
  • 2 篇 kacker raghu
  • 2 篇 guirik alexei
  • 2 篇 lijun zhang
  • 2 篇 zhang xiaoyu
  • 2 篇 luther wolfram
  • 2 篇 jia fan

语言

  • 78 篇 英文
  • 4 篇 其他
  • 2 篇 中文
检索条件"主题词=cryptographic algorithm"
84 条 记 录,以下是21-30 订阅
排序:
A Survey on Hardware Implementation of cryptographic algorithms Using Field Programmable Gate Array
A Survey on Hardware Implementation of Cryptographic Algorit...
收藏 引用
International Conference on Communication Systems and Network Technologies (CSNT)
作者: Keshav Kumar K.R. Ramkumar Amanpreet Kaur Somanshu Choudhary Chitkara University Institute of Engineering and TechnologyChitkara University Punjab India
In the past recent years the idea towards secure data communication is increasing day by day. The secure communication is being achieved by applying various cryptographic algorithms on the data which is to be transfer... 详细信息
来源: 评论
Implementation of ARIA cryptographic Modules based on ARM9 Devices
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2014年 第2期8卷 243-250页
作者: Yi, Okyeon Yun, Seunghwan Park, Myungseo Song, HaengGwon Kookmin Univ Dept Math Seoul South Korea
Information over Internet needs to be communicated secure and prompt. But every cryptographic algorithm of the information requires extra time and memory space for execution in the systems such as PC or smart device. ... 详细信息
来源: 评论
Cooperative Model Reconstruction for cryptographic Protocols Using Visual Languages
Cooperative Model Reconstruction for Cryptographic Protocols...
收藏 引用
15th International Workshop on Groupware - Design, Implementation, and Use
作者: Weyers, Benjamin Luther, Wolfram Baloian, Nelson Univ Duisburg Essen INKO Lotharstr 65 Duisburg Germany Univ Chile Dept Comp Sci Santiago Chile
Cooperative work in learning environments has been shown to be a successful extension to traditional learning systems due to the great impact of cooperation on students' motivation and learning success. In this pa... 详细信息
来源: 评论
A High-Efficiency Reconfigurable cryptographic Processor
A High-Efficiency Reconfigurable Cryptographic Processor
收藏 引用
IEEE International Conference on Integrated Circuits and Microsystems (ICICM)
作者: Wang, Shoucheng Xu, Jinhui Yan, Yingjian Li, Gongli Inst Informat Sci & Technol Dept Microelect Zhengzhou Peoples R China Henan Normal Univ Coll Comp & Informat Engn Xinxiang Peoples R China
With the significant attention to information security, mobile terminals such as smartphone always be demand for integrating cryptographic processor. In this paper, a high-efficiency reconfigurable cryptographic proce... 详细信息
来源: 评论
Hardware-Assisted Security Mechanism: the Acceleration of cryptographic Operations with Low Hardware Cost
Hardware-Assisted Security Mechanism: the Acceleration of Cr...
收藏 引用
IEEE 29th International Performance Computing and Communications Conference
作者: Chang, Jed Kao-Tung Liu, Shaoshan Gaudiot, Jean-Luc Liu, Chen Univ Calif Irvine Dept Elect Engn & Comp Sci Irvine CA 92697 USA Florida Int Univ Dept Elect & Comp Engn Miami FL 33174 USA
This paper presents generic cryptographic accelerator. Certain ""hotspot function"" are found in the cryptographic algorithm which consume a substantial amount of execution time of the specific alg... 详细信息
来源: 评论
Performance Evaluation of Firmware cryptographic Modules on Various MCU Environments  3
Performance Evaluation of Firmware Cryptographic Modules on ...
收藏 引用
3rd International Conference on Platform Technology and Service (PlatCon)
作者: An, Hyunjung Yun, Seunghwan Yi, Okyeon Kookmin Univ Grad Sch Dept Financial Informat Secur Seoul South Korea Korea Univ Ctr Informat Secur Technol Seoul South Korea Kookmin Univ Dept Math Seoul South Korea
With the development of IoT(Internet of Things), the combination of ICT(Information and Communications Technologies) is active in devices and systems on off-line and the Hyper Connectivity Age is becoming. This provid... 详细信息
来源: 评论
Systematic Testing of Post-Quantum cryptographic Implementations Using Metamorphic Testing  4
Systematic Testing of Post-Quantum Cryptographic Implementat...
收藏 引用
IEEE/ACM 4th International Workshop on Metamorphic Testing (MET)
作者: Pugh, Sydney Raunak, M. S. Kuhn, D. Richard Kacker, Raghu Loyola Univ Maryland Dept Comp Sci Baltimore MD 21210 USA NIST Gaithersburg MD 20899 USA
cryptographic algorithms are usually complex, and their code is highly compact. Moreover, there is often no test oracle to easily test some of these algorithms. Together these attributes make it extremely challenging ... 详细信息
来源: 评论
T-depth reduction method for efficient SHA-256 quantum circuit construction
收藏 引用
IET INFORMATION SECURITY 2023年 第1期17卷 46-65页
作者: Lee, Jongheon Lee, Sokjoon Lee, You-Seok Choi, Dooho Univ Sci & Technol UST Dept Informat Secur Engn Daejeon South Korea Elect & Telecommun Res Inst ETRI Cryptog Engn Res Sect Daejeon South Korea Gachon Univ Dept Comp Engn Smart Secur Seongnam South Korea Korea Univ Sejong Coll Sci & Technol Dept AI Cyber Secur Sejong 30019 South Korea
To perform a quantum brute force attack on a cryptosystem based on Grover's algorithm, it is necessary to implement a quantum circuit of the cryptographic algorithm. Therefore, an efficient quantum circuit design ... 详细信息
来源: 评论
Security-aware optimization for ubiquitous computing systems with SEAT graph approach
收藏 引用
JOURNAL OF COMPUTER AND SYSTEM SCIENCES 2013年 第5期79卷 518-529页
作者: Qiu, Meikang Zhang, Lei Ming, Zhong Chen, Zhi Qin, Xiao Yang, Laurence T. Univ Kentucky Dept Elec & Comp Engr Lexington KY 40506 USA Univ Texas Dallas Dept Comp Sci Richardson TX 75083 USA Shenzhen Univ Coll Comp Sci & Software Engr Shenzhen 518060 GD Peoples R China Auburn Univ Dept Comp Sci & Software Engr Auburn AL 36849 USA St Francis Xavier Univ Dept Comp Sci Antigonish NS B2G 2W5 Canada
For ubiquitous computing systems, security has become a new metric that designers should consider throughout the design process, along with other metrics such as performance and energy consumption. A combination of se... 详细信息
来源: 评论
Energy efficiency of encryption schemes applied to wireless sensor networks
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2012年 第7期5卷 789-808页
作者: Zhang, Xueying Heys, Howard M. Li, Cheng Mem Univ Newfoundland Fac Engn & Appl Sci St John NF A1B 3X5 Canada
In this paper, we focus on the energy efficiency of secure communication in wireless sensor networks (WSNs). Our research considers link layer security of WSNs, investigating both the ciphers and the cryptographic imp... 详细信息
来源: 评论