咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 116 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 246 篇 工学
    • 155 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 293 篇 encryption algor...
  • 79 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 15 篇 data security
  • 15 篇 images
  • 14 篇 image
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 decryption
  • 9 篇 algorithms
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 security level

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 279 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
293 条 记 录,以下是181-190 订阅
排序:
Cryptoraptor: High Throughput Reconfigurable Cryptographic Processor  33
Cryptoraptor: High Throughput Reconfigurable Cryptographic P...
收藏 引用
33rd IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
作者: Sayilar, Gokhan Chiou, Derek Univ Texas Austin Austin TX 78712 USA Microsoft Redmond WA USA
This paper describes a high performance, low power, and highly flexible cryptographic processor, Cryptoraptor, which is designed to support both today's and tomorrow's symmetric-key cryptography algorithms and... 详细信息
来源: 评论
Parameter Dependencies and Optimization of True Random Number Generator (TRNG) using Genetic algorithm (GA)  8
Parameter Dependencies and Optimization of True Random Numbe...
收藏 引用
8th International Conference on Smart Computing and Communications (ICSCC)
作者: Deotare, Vilas Padole, Dinesh Wadhwa, Lalitkumar SPPU Univ NMIET Coll Elect & Technol Pune Maharashtra India GH Raisoni Coll Engn Dept Elect Engn Nagpur Maharashtra India
In the hostile environment, use of pseudo-random numbers in encryption algorithm has become difficult due to increased computing power of attackers. To overcome from the hackers true random number generator solving by... 详细信息
来源: 评论
A more energy efficient network setup method for wireless sensor networks
A more energy efficient network setup method for wireless se...
收藏 引用
11th Asia-Pacific Conference on Communications
作者: Niati, R Yazdani, N Univ Teheran Dept Elect & Comp Engn Tehran 14174 Iran
Wireless sensor networks are one of the pioneer technologies of the new century. The low cost of these networks makes them applicable to a variety of areas from battlefields and environment monitoring to health and ho... 详细信息
来源: 评论
Chaotic Generator Synthesis: Dynamical and Statistical Analysis
Chaotic Generator Synthesis: Dynamical and Statistical Analy...
收藏 引用
7th International Conference for Internet Technology and Secured Transactions (ICITST)
作者: Taralova, Ina Lozi, Rene El Assad, Safwan Ecole Cent Nantes IRCCyN 1 Rue Noe F-44321 Nantes France Univ Nice Sophia Antipolis Laboratoire J Dieudonne CNRS UMR 7351 F-F06046 Nice France Polytech Nantes IETR CNRS UMR 6164 F-44306 Nantes France
The paper presents a novel chaotic encryption algorithm which can be used to improve the communication security. An uncomplicated process of chaotic substitution permutation network (SPN) with variable control paramet... 详细信息
来源: 评论
A Smaller and Faster Variant of RSM
A Smaller and Faster Variant of RSM
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition (DATE)
作者: Yamashita, Noritaka Minematsu, Kazuhiko Okamura, Toshihiko Tsunoo, Yukiyasu NEC Corporation 1753 Shimonumabe Nakahara-Ku Kawasaki Kanagawa 211-8666 Japan|c|
Masking is one of the major countermeasures against side-channel attacks to cryptographic modules. Nassar et al. recently proposed a highly efficient masking method, called Rotating S-boxes Masking (RSM), which can be... 详细信息
来源: 评论
Quantum image encryption based on phase-shift transform and quantum Haar wavelet packet transform
收藏 引用
MODERN PHYSICS LETTERS A 2019年 第26期34卷
作者: Li, Hai-Sheng Li, ChunYu Chen, Xiao Xia, HaiYing Guangxi Normal Univ Coll Elect Engn Guilin 541004 Guangxi Peoples R China
An algorithm of quantum image encryption based on a normal arbitrary superposition state (NASS) is proposed by using quantum geometric transform, phase-shift transform, and quantum Haar wavelet packet transform (QHWPT... 详细信息
来源: 评论
Evaluation of Susceptibility of FPGA-based Circuits to Fault Injection Attacks Based on Clock Glitching
Evaluation of Susceptibility of FPGA-based Circuits to Fault...
收藏 引用
IEEE 15th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)
作者: Korczyc, Jakub Krasniewski, Andrzej Warsaw Univ Technol Inst Telecommun Warsaw Poland
We present a method and tool for examining an FPGA-based circuit, in particular an implementation of a cryptographic algorithm, subjected to a fault injection attack based on clock glitching. The proposed approach off... 详细信息
来源: 评论
A Flight Data Storage System with Efficient Compression and Enhanced Security
A Flight Data Storage System with Efficient Compression and ...
收藏 引用
IEEE/AIAA 31st Digital Avionics Systems Conference (DASC)
作者: Cho, Seung-Hoon Ha, Seok-Wun Moon, Yong-Ho Jeong, Chan-Bok Gyeongsang Natl Univ Dept Informat Chinju South Korea
In general, all kinds of aircrafts have the flight data storage systems such as DTS, Black-box and etc. Data to be stored in such equipment contains very important information that is related to the flight performance... 详细信息
来源: 评论
Portable Parallelized Blowfish Via RenderScript  16
Portable Parallelized Blowfish Via RenderScript
收藏 引用
16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
作者: Davis, Spencer Jones, Brandon Jiang, Hai Arkansas State Univ Dept Comp Sci State Univ AR 72467 USA
The recent rise in the popularity of mobile computing has brought the attention of mobile security to the forefront. As users depend more on tablets and smartphones, sensitive data is left to be secured using devices ... 详细信息
来源: 评论
A Novel Approach to Secure WEP by Introducing an Additional Layer over RC4  3
A Novel Approach to Secure WEP by Introducing an Additional ...
收藏 引用
3rd International Conference on Computing for Sustainable Global Development (INDIACom)
作者: Garg, Ashish Ctr Dev Adv Comp Noida India
Wired Equivalent Privacyis use to secure wireless networks specifically wireless LAN (Wi-Fi). The core of WEP protocol is the RC4 (Ron's Code-4) algorithm, this paper start with introductory section about descript... 详细信息
来源: 评论