咨询与建议

限定检索结果

文献类型

  • 282 篇 会议
  • 101 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 385 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 105 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 134 篇 理学
    • 89 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 385 篇 encryption algor...
  • 16 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 encryption
  • 4 篇 aes
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 rsa
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish
  • 2 篇 parallel process...

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...
  • 2 篇 quan cheng labor...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna
  • 2 篇 yarmilko andrii

语言

  • 304 篇 英文
  • 78 篇 其他
  • 7 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
385 条 记 录,以下是131-140 订阅
The Smart and Secured Communication Using Applied Cryptography algorithms  5th
The Smart and Secured Communication Using Applied Cryptograp...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Agarwal, Trapty Jebakumari, S. Adlin Hemlata Ayesha, Amreen Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Department of Computer Science and Information Technology Jain University Karnataka Bangalore India Department of Computer Science & Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Manduwala Dehradun Navgaon India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India
This paper describes the implementation of a at ease communication device the usage of an implemented cryptography algorithm. The gadget is designed to provide comfy statistics and voice communique between endpoints u... 详细信息
来源: 评论
AESHA3: Efficient and Secure Sub-Key Generation for AES Using SHA-3  14th
AESHA3: Efficient and Secure Sub-Key Generation for AES Us...
收藏 引用
14th EAI International Conference on Broadband Communications, Networks, and Systems, BROADNETS 2024
作者: Soni, Ankush Sahay, Sanjay K. Mehta, Parit Department of Computer Science and Information Systems BITS Pilani K. K. Birla Goa Campus Zuarinagar India
Advanced encryption Standard (AES) is one of the most widely used symmetric cipher for the confidentiality of data. Also it is used for other security services, viz. integrity, authentication and key establishment. Ho... 详细信息
来源: 评论
Research on identification of domestic commercial block cipher algorithms based on deep learning  4
Research on identification of domestic commercial block ciph...
收藏 引用
4th International Conference on Computer Vision, Application, and Algorithm, CVAA 2024
作者: Li, Li Chen, Jun School of Computer Science Chengdu University of Information Technology 24 Block 1 Xuefu Road Chengdu610225 China
With the widespread application of domestic commercial cryptographic algorithms and the advancement of commercial cryptographic application evaluation, the compliance of these algorithms has garnered significant atten... 详细信息
来源: 评论
Detection of Unknown Darknet Traffic with Random Forest  16th
Detection of Unknown Darknet Traffic with Random Forest
收藏 引用
16th International Conference on Genetic and Evolutionary Computing, ICGEC 2024
作者: Lee, Dong-Yu Nguyen, Thanh-Lam Shieh, Chin-Shiuh Horng, Mong-Fong Tsai, Casper Miu, Denis National Kaohsiung University of Science and Technology Kaohsiung Taiwan Auray Technology Corp. Taoyuan Taiwan Genie Networks Ltd. Taipei Taiwan
Darknet refers to an overlay network that requires the use of special software to access. Tor (The Onion Router) is one of the software used to access the darknet. Tor uses unique routing methods and encryption algori... 详细信息
来源: 评论
Bit-Security Preserving Hardness Amplification  22nd
Bit-Security Preserving Hardness Amplification
收藏 引用
22nd Theory of Cryptography Conference, TCC 2024
作者: Watanabe, Shun Yasunaga, Kenji Tokyo University of Agriculture and Technology Tokyo Japan Institute of Science Tokyo Tokyo Japan
Hardness amplification is one of the important reduction techniques in cryptography, and it has been extensively studied in the literature. The standard XOR lemma known in the literature evaluates the hardness in... 详细信息
来源: 评论
Bit Security: Optimal Adversaries, Equivalence Results, and a Toolbox for Computational-Statistical Security Analysis  22nd
Bit Security: Optimal Adversaries, Equivalence Results, and...
收藏 引用
22nd Theory of Cryptography Conference, TCC 2024
作者: Micciancio, Daniele Schultz-Wu, Mark University of California San Diego United States
We investigate the notion of bit-security for decisional cryptographic properties, as originally proposed in (Micciancio & Walter, Eurocrypt 2018), and its main variants and extensions, with the goal clarifying th... 详细信息
来源: 评论
Efficient Synchronous and Asynchronous Folded Architectures of SHA-3  15
Efficient Synchronous and Asynchronous Folded Architectures ...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Reddy, G.R. Sarath Chandra Mohamed Asan Basiri, M. Department of Electronics and Communication Engineering Indian Institute of Information Technology Design and Manufacturing Kurnool518007 India
Secure hash algorithm plays a major role to achieve the integrity in secure data communication. The SHA-3 is the recent crypto hash algorithm recognized by national institute of standards and technology. This paper pr... 详细信息
来源: 评论
Cipherkeyx Algorithm: Cryptographic Block Cipher Algorithm for Secure Machine Learning Authentication  2
Cipherkeyx Algorithm: Cryptographic Block Cipher Algorithm f...
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational Science, ICERCS 2024
作者: Nishanthi, G. Thangarasu, N. Karpagam Academy of Higher Education Coimbatore India Karpagam Academy of Higher Education Department of Computer Science Coimbatore India
With increasing cyber threats, secure authentication of users in machine learning systems has never been more necessary. In this paper, we develop the CipherKeyX Algorithm: A novel cryptographic block cipher able to r... 详细信息
来源: 评论
Cryptography with Integer Multinumbers  5
Cryptography with Integer Multinumbers
收藏 引用
5th IEEE International Conference on Communications, Information, Electronic and Energy Systems, CIEES 2024
作者: Kimak, Volodymyr Kravtsiv, Viktoriia Zagorodnyuk, Andriy Vasyl Stefanyk Precarpathian National University Faculty of Mathematics and Informatics Ivano-Frankivsk Ukraine
This paper presents an analysis of a cryptographic algorithm based on integer multinumbers. We discuss the quantum-resistance of this algorithm, and some questions related to its security. In particular, we consider t... 详细信息
来源: 评论
Quantum Randomness and Key Hashing in SSH Authentication Across Asymmetric Cryptographic algorithms  2
Quantum Randomness and Key Hashing in SSH Authentication Acr...
收藏 引用
2nd IEEE Global Conference on Communications and Information Technologies, GCCIT 2024
作者: Mohamed Yaqub, A. Sudikshan, S. Navin Balaji, E. Adarsh, A. Gayathri, M. Srm Institute of Science and Technology Department of Computing Technologies Tamilnadu Chennai603203 India Srm Institute of Science and Technology Department of Networking and Communications Tamilnadu Chennai603203 India
In the ever-evolving field of cybersecurity, randomness plays a critical role in cryptographic systems. Traditional pseudo-random number generators, while widely used, can be vulnerable to attacks due to their determi... 详细信息
来源: 评论