咨询与建议

限定检索结果

文献类型

  • 282 篇 会议
  • 101 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 385 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 105 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 134 篇 理学
    • 89 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 385 篇 encryption algor...
  • 16 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 encryption
  • 4 篇 aes
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 rsa
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish
  • 2 篇 parallel process...

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...
  • 2 篇 quan cheng labor...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna
  • 2 篇 yarmilko andrii

语言

  • 304 篇 英文
  • 78 篇 其他
  • 7 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
385 条 记 录,以下是221-230 订阅
排序:
Finding Zero Correlation Linear Hulls Using Quantum Bernstein-vazirani Algorithm
Finding Zero Correlation Linear Hulls Using Quantum Bernstei...
收藏 引用
2024 International Conference on Computational Intelligence and Communication System, CCICS 2024
作者: Xie, Huiqin Zhao, Zhangmei Beijing Electronic Science and Technology Institute Beijing100070 China
Facing the threat of quantum computing to cryptography schemes, it is urgent to study the applications of quantum algorithms to cryptanalysis and evaluate the security of cryptographic schemes in a quantum computing e... 详细信息
来源: 评论
Secure Data Transmission Through Applied Cryptography algorithms  15
Secure Data Transmission Through Applied Cryptography Algori...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Kumar, Anup Seth, Jyoti Chethan, M. Department of Mechnical Engineering ARKA JAIN University Jharkhand Jamshedpur India Department of Computer Science & Engineering Vivekananda Global University Jaipur India Karnataka Bangalore India
Comfy records transmission is a crucial generation in the data safety area. It entails the use of cryptographic algorithms to secure statistics in order that it cannot be accessed without authorization. Cryptography a... 详细信息
来源: 评论
Effective Adaptable Framework for Security of IoT Devices  3
Effective Adaptable Framework for Security of IoT Devices
收藏 引用
3rd International Conference on Communication, Control, and Intelligent Systems, CCIS 2024
作者: Sharma, Cheshta Sharma, Tripti Shri Venkateshwara University Department of Computer Science and Engineering Gajraula India Inderprasth Engineering College Department of Computer Science and Engineering Ghaziabad India
The Internet of Things (IoT) becomes the most demanding technology over the past few years. IoT is the basic need of daily life. The security of these devices is very important because they contain large files of sens... 详细信息
来源: 评论
Enhancing IoT Security: A Comprehensive Review of Lightweight Security Mechanisms for IoT
Enhancing IoT Security: A Comprehensive Review of Lightweigh...
收藏 引用
2024 International Conference on Information Technology Systems and Innovation, ICITSI 2024
作者: Pradana, Aditya Permana, Fahmi Candra Mutijarsa, Kusprasapta Bandung, Yoanes Institut Teknologi Bandung School of Electrical Engineering and Informatics Bandung Indonesia
In this paper, we review lightweight security approaches for resource-constrained IoT devices. Previous research has explored various lightweight cryptographic algorithms, such as PRESENT, PRIDE, SNOW-V, and ChaCha20 ... 详细信息
来源: 评论
Optimizing AES-256 with Keccak Permutations: Achieving High Security and Performance with Reduced Rounds  15
Optimizing AES-256 with Keccak Permutations: Achieving High ...
收藏 引用
15th International Conference on Information and Communication Technology Convergence, ICTC 2024
作者: Chio, Ma. Esther B. Sison, Ariel M. Medina, Ruji P. Technological Institute of the Philippines Quezon City Philippines University of Science and Technology of Southern Philippines Cagayan de Oro City Philippines Emilio Aguinaldo College Manila Philippines
This study introduces an innovative approach to enhancing AES-256 encryption by integrating the Keccak permutation into its key generation process, aiming to improve both security and performance while reducing the nu... 详细信息
来源: 评论
Secure Key Generation and Distribution at Physical Layer by Using Ultra-Long Fiber Laser  3
Secure Key Generation and Distribution at Physical Layer by ...
收藏 引用
3rd IEEE International Conference on Problems of Informatics, Electronics and Radio Engineering, PIERE 2024
作者: Nyushkov, Boris Korel, Igor Novosibirsk State Technical University Quantum Cryogenic Electronics laboratory Novosibirsk Russia
Secure fiber-optic communication systems are an important area of research and development in the IT industry. In this work, we report the development of a promising fiber laser system for physical-layer secure key ge... 详细信息
来源: 评论
Examining the Efficiency of Implemented Cryptographic algorithms for Blockchain Technologies  15
Examining the Efficiency of Implemented Cryptographic Algori...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Premalatha, K.P. Sahu, Kuldip Kumar Gour, Murli Manohar Department of Management School of Mangement - PG JAIN Karnataka Bangalore India Department of Mechnical Engineering ARKA JAIN University Jharkhand Jamshedpur India Department of Mathematics Vivekananda Global University Jaipur India
This paper explores the performance of implemented cryptography algorithms used for various blockchain technologies, which include Bitcoin, Ethereum, and Hyperledger. Diverse techniques for assessing cryptographic alg... 详细信息
来源: 评论
Improving Blockchain Privacy Security Based on Improved RSA Algorithm  5
Improving Blockchain Privacy Security Based on Improved RSA ...
收藏 引用
5th International Symposium on Computer Engineering and Intelligent Communications, ISCEIC 2024
作者: Zeng, Zhejun Lin, Ning Xiao, Qunli Xiao, HengHui Huang, Xubin Ning, Liyan Huang, Yusi Wu, Hongwu Mai, Zhuoqi Hu, Faming Guangdong Planning and Designing Institute of Telecommunication Co. Ltd. Guangdong China Guangdong Communications Services Company Limited Guangdong China
This paper proposes a blockchain privacy encryption scheme based on CRT-RSA algorithm. This encryption scheme decomposes the large integer modular operation of RSA algorithm into two smaller modular operations, which ... 详细信息
来源: 评论
Research on the Parallel SM4-OFB Acceleration Based on Multiple Rounds of Iteration  3
Research on the Parallel SM4-OFB Acceleration Based on Multi...
收藏 引用
3rd International Conference on Artificial Intelligence and Computer Information Technology, AICIT 2024
作者: Han, Ya Wang, Mingsheng Li, Yongqiang Ren, Lifeng Institute of Information Engineering CAS Key Laboratory of Cyberspace Security Defense Beijing China Chongqing Research Institute of Big Data Peking University Chongqing China
In OFB mode, the output of the cryptographic algorithm is fed back to the input of the cryptographic algorithm. The OFB mode does not directly encrypt plaintext through cryptographic algorithms, but generates cipherte... 详细信息
来源: 评论
Radical (formula presented) Isogeny Formulae  44th
Radical (formula presented) Isogeny Formulae
收藏 引用
44th Annual International Cryptology Conference, CRYPTO 2024
作者: Decru, Thomas Université Libre de Bruxelles Bruxelles Belgium
We provide explicit radical N-isogeny formulae for all odd integers N. The formulae are compact closed-form expressions which require one Nth root computation and O(N) basic field operations. The formulae are highly e... 详细信息
来源: 评论