咨询与建议

限定检索结果

文献类型

  • 50 篇 会议
  • 32 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 84 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 57 篇 计算机科学与技术...
    • 33 篇 电气工程
    • 22 篇 信息与通信工程
    • 11 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 3 篇 石油与天然气工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
  • 7 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 6 篇 理学
    • 5 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 3 篇 医学
    • 2 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 84 篇 cryptographic al...
  • 12 篇 cryptography
  • 11 篇 security
  • 7 篇 encryption
  • 5 篇 fpga
  • 4 篇 throughput
  • 4 篇 aes
  • 4 篇 smart grid
  • 3 篇 power grid
  • 3 篇 wide-area monito...
  • 3 篇 block cipher
  • 3 篇 rsa
  • 3 篇 decryption
  • 3 篇 cloud computing
  • 3 篇 scheduling
  • 3 篇 digital signatur...
  • 2 篇 application spec...
  • 2 篇 data security
  • 2 篇 access control
  • 2 篇 cipher

机构

  • 3 篇 univ chinese aca...
  • 2 篇 loyola univ mary...
  • 2 篇 science and tech...
  • 2 篇 kookmin univ dep...
  • 2 篇 brno university ...
  • 2 篇 chinese acad sci...
  • 2 篇 tsinghua univ in...
  • 2 篇 univ chile dept ...
  • 1 篇 univ cooperat co...
  • 1 篇 dept. of compute...
  • 1 篇 elect & telecomm...
  • 1 篇 al maarif univ c...
  • 1 篇 delhi technical ...
  • 1 篇 hiroshima univ r...
  • 1 篇 chinese acad sci...
  • 1 篇 chinese acad sci...
  • 1 篇 sci & technol co...
  • 1 篇 tsinghua univ ts...
  • 1 篇 dept.of computer...
  • 1 篇 electrical engin...

作者

  • 2 篇 li zerun
  • 2 篇 zhang lei
  • 2 篇 baloian nelson
  • 2 篇 chakraborty moum...
  • 2 篇 yun seunghwan
  • 2 篇 budko mikhail
  • 2 篇 wu liji
  • 2 篇 kuhn d. richard
  • 2 篇 yi okyeon
  • 2 篇 saha debasri
  • 2 篇 qiu meikang
  • 2 篇 zhang xiangmin
  • 2 篇 liu rui
  • 2 篇 chakrabarti amla...
  • 2 篇 kacker raghu
  • 2 篇 guirik alexei
  • 2 篇 lijun zhang
  • 2 篇 zhang xiaoyu
  • 2 篇 luther wolfram
  • 2 篇 jia fan

语言

  • 78 篇 英文
  • 4 篇 其他
  • 2 篇 中文
检索条件"主题词=cryptographic algorithm"
84 条 记 录,以下是31-40 订阅
排序:
An interesting way to partition a number
收藏 引用
INFORMATION PROCESSING LETTERS 1999年 第3-4期71卷 141-148页
作者: Bhatt, PCP Kochi Univ Technol Tosayamada Kochi 7828502 Japan
This note reports an interesting kind of partition, called an s-partition, for a natural number n. Each cell in an s-partition has an element of the form 2(r) - 1. We give a recurrence relation to enumerate all s-part... 详细信息
来源: 评论
Research on a high-order AES mask anti-power attack
收藏 引用
IET INFORMATION SECURITY 2020年 第5期14卷 580-586页
作者: Ou, Yu Li, Lang Hunan Normal Univ Coll Informat Sci & Engn Changsha 410081 Peoples R China Hunan Prov Key Lab Intelligent Informat Proc & Ap Hengyang 421002 Peoples R China Hengyang Normal Univ Coll Comp Sci & Technol Hengyang 421002 Peoples R China
The cryptographic algorithm has been gradually improved in design, but its implementations are vulnerable to side-channel analysis (SCA). Generally speaking, adding a mask to the primitive is the best way to counterac... 详细信息
来源: 评论
A high security and efficiency protection of confidentiality and integrity for off-chip memory
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2019年 第7期10卷 2633-2643页
作者: Su, Yang Shen, Jun-Wei Zhang, Min-Qing Engn Univ PAP Xian 710086 Shaanxi Peoples R China State Key Lab Cryptol POB 5159 Beijing 100878 Peoples R China
Due to the cost, power requirements and capacity, data are mainly stored off-chip rather than on-chip in embedded systems. The data exchanged between the processor and off-chip memory might be sensitive, security and ... 详细信息
来源: 评论
A novel cryptosystem with lock generation and sum-difference replacement ladder
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2002年 第10期E85D卷 1719-1722页
作者: Shen, VRL Chen, TS Mingchi Inst Technol Dept Elect Engn Taipei 243 Taiwan Tunghai Univ Dept Informat Management Taichung 40704 Taiwan
According to the grey data generating techniques in grey system theory, we propose a novel cryptosystem, whose applications can develop a new direction in the field of information security. In this paper, we present t... 详细信息
来源: 评论
Faults, injection methods, and fault attacks
收藏 引用
IEEE DESIGN & TEST OF COMPUTERS 2007年 第6期24卷 544-545页
作者: Kim, Chong Hee Quisquater, Jean-Jacques Univ Catholique Louvain Dept Elect Engn Crypto Grp B-1348 Louvain Belgium
In a fault attack, errors are induced during the computation of a cryptographic algorithm, and the faulty results are exploited to extract information about the secret key in embedded systems. Fault attacks can break ... 详细信息
来源: 评论
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES AND STANDARDIZATION
收藏 引用
COMPUTER STANDARDS & INTERFACES 1995年 第1期17卷 63-67页
作者: KRAUSE, L NATL RES CTR COMP SCI GMDD-52737 ST AUGUSTINGERMANY
A brief history of international standardization of IT security techniques is given beginning with the first working group within ICO/TC97 in 1980. Nowadays security is dealt with by an increasing number of standardiz... 详细信息
来源: 评论
A CAD approach for pre-layout optimal PDN design and its post-layout verification
收藏 引用
MICROPROCESSORS AND MICROSYSTEMS 2019年 65卷 158-168页
作者: Chakraborty, Moumita Saha, Debasri Chakrabarti, Amlan Bindai, Sayani Univ Calcutta AK Choudhuly Sch Informat Technol Sect 3 Kolkata 700106 India Maulana Abul Kalam Azad Univ Technol Kolkata India
Design of power distribution network (PDN) draws great attention to integrated circuit (IC) designers as it directly affects the circuit performance. The challenge is to immune the circuit from the noise arising due t... 详细信息
来源: 评论
An AES Implementation with Improved PDL Based PUF Key Generator for IoT Devices
收藏 引用
IETE TECHNICAL REVIEW 2024年 第1期41卷 13-21页
作者: Boke, Amol K. Nakhate, Sangeeta Rajawat, Arvind Maulana Azad Natl Inst Technol Elect & Commun Engn Dept Bhopal MP India
In recent days, cryptographic algorithm hardware is the need of IoT devices. However, limited resources demand an efficient approach towards designing the said cryptographic algorithm hardware. This paper introduces t... 详细信息
来源: 评论
Energy Efficient Security algorithm for Power Grid Wide Area Monitoring System
收藏 引用
IEEE TRANSACTIONS ON SMART GRID 2011年 第4期2卷 715-723页
作者: Qiu, Meikang Gao, Wenzhong Chen, Min Niu, Jian-Wei Zhang, Lei Huazhong Univ Sci & Technol Sch Comp Sci & Technol Wuhan 430074 Peoples R China Univ Kentucky Dept Elect & Comp Engn Lexington KY 40506 USA Univ Denver Dept Elect & Comp Engn Denver CO 80210 USA Seoul Natl Univ Seoul 151742 South Korea Beihang Univ State Key Lab Software Dev Environm Beijing 100191 Peoples R China Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu 611731 Sichuan Peoples R China
Modern power grid is the most complex human-made system, which is monitored by wide-area monitoring system (WAMS). Providing time-synchronized data of power system operating states, WAMS will play a crucial role in ne... 详细信息
来源: 评论
Secured energy optimized Ad hoc on-demand distance vector routing protocol
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2018年 72卷 766-773页
作者: Amutha, S. Balasubramanian, Kannan PSR Engn Coll Dept Comp Sci & Engn Sivakasi Virudhunagar India Mepco Schlenk Engn Coll Dept Comp Sci & Engn Sivakasi Virudhunagar India
A Mobile Ad hoc network (MANET) forms a group of mobile nodes which are active and exchange messages using interconnections between the nodes. The mobile network is the new generation of wireless network and differs f... 详细信息
来源: 评论