咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
389 条 记 录,以下是311-320 订阅
排序:
Secure Key Generation and Distribution at Physical Layer by Using Ultra-Long Fiber Laser  3
Secure Key Generation and Distribution at Physical Layer by ...
收藏 引用
3rd IEEE International Conference on Problems of Informatics, Electronics and Radio Engineering, PIERE 2024
作者: Nyushkov, Boris Korel, Igor Novosibirsk State Technical University Quantum Cryogenic Electronics laboratory Novosibirsk Russia
Secure fiber-optic communication systems are an important area of research and development in the IT industry. In this work, we report the development of a promising fiber laser system for physical-layer secure key ge... 详细信息
来源: 评论
Research on the Parallel SM4-OFB Acceleration Based on Multiple Rounds of Iteration  3
Research on the Parallel SM4-OFB Acceleration Based on Multi...
收藏 引用
3rd International Conference on Artificial Intelligence and Computer Information Technology, AICIT 2024
作者: Han, Ya Wang, Mingsheng Li, Yongqiang Ren, Lifeng Institute of Information Engineering CAS Key Laboratory of Cyberspace Security Defense Beijing China Chongqing Research Institute of Big Data Peking University Chongqing China
In OFB mode, the output of the cryptographic algorithm is fed back to the input of the cryptographic algorithm. The OFB mode does not directly encrypt plaintext through cryptographic algorithms, but generates cipherte... 详细信息
来源: 评论
Radical (formula presented) Isogeny Formulae  44th
Radical (formula presented) Isogeny Formulae
收藏 引用
44th Annual International Cryptology Conference, CRYPTO 2024
作者: Decru, Thomas Université Libre de Bruxelles Bruxelles Belgium
We provide explicit radical N-isogeny formulae for all odd integers N. The formulae are compact closed-form expressions which require one Nth root computation and O(N) basic field operations. The formulae are highly e... 详细信息
来源: 评论
Real Running Time Analysis of Multi Prime RSA Algorithm and XRSA in Securing Digital Messages
Real Running Time Analysis of Multi Prime RSA Algorithm and ...
收藏 引用
2024 International Conference on Information Technology Research and Innovation, ICITRI 2024
作者: Syanti, Nurfadhilah Budiman, Mohammad Andri Sawaluddin Universitas Sumatera Utara Faculty of Computer Science and Information Technology Medan Indonesia Universitas Sumatera Utara Faculty of Mathematics and Sciences Medan Indonesia
All digital information exchange is not free from security threats in terms of information exchange, so a technique or method is needed to make message exchange in today's all-digital era safer. Therefore, this re... 详细信息
来源: 评论
Performance Evaluation of Block Cipher algorithms Implementations in ARM Architecture  4
Performance Evaluation of Block Cipher Algorithms Implementa...
收藏 引用
4th IEEE International Conference on Electrical, Computer, and Energy Technologies, ICECET 2024
作者: Lopez Hernandez, Lissete Cabrera, Alberto Palacios Priego, Mario D. Perez De Abiega-L'eglisse, Alfonso F. Gallegos-Garcia, Gina Escuela Superior de Cómputo Instituto Politécnico Nacional Mexico City Mexico Tecnológico de Monterrey Science and Mathematics Department N.L. Monterrey Mexico Instituto Politécnico Nacional Centro de Investigación en Computación Mexico City Mexico
Since the arrival of devices connected to the Internet, cryptographic goals have become a constant challenge for cybersecurity specialists. Data transmitted between IoT devices can become sensitive depending on the ap... 详细信息
来源: 评论
An Implementation of R-Ate Pairing Based on FPGA  3
An Implementation of R-Ate Pairing Based on FPGA
收藏 引用
3rd International Conference on Big Data, Information and Computer Network, BDICN 2024
作者: Dong, Xiuze Gao, Mingze Ma, Xujian Xiao, Chaoen Zhang, Lei Beijing Electronic Science and Technology Institute Beijing100070 China
R-Ate pair is an important bilinear mapping in state secret SM9 cryptographic algorithm, and its computational efficiency is closely related to the implementation performance of SM9. This scheme uses variable-length M... 详细信息
来源: 评论
Construction of Nonlinear Cryptographic Protocol based on Multiple Linear Cryptosystems  14
Construction of Nonlinear Cryptographic Protocol based on Mu...
收藏 引用
14th International Conference on Advanced Computer Information Technologies, ACIT 2024
作者: Muliar, Ihor Anikin, Volodymyr Yatskiv, Vasyl Kulyna, Serhii Humennyy, Petro Kulyna, Halyna Khmelnytskyi National University Department of Cybersecurity Khmelnytskyi Ukraine West Ukrainian National University Department of Cybersecurity Ternopil Ukraine West Ukrainian National University Department of Specialized computer systems Ternopil Ukraine West Ukrainian National University Department of Financial Technologies and Banking Business Ternopil Ukraine
The paper describes the construction of nonlinear cryptographic protocol, based on separate linear cryptosystems. Implementation of suggested construction scheme enables encryption of data blocks with ready-made and p... 详细信息
来源: 评论
End to End Encrypted Messaging Application Using ORDEX  6
End to End Encrypted Messaging Application Using ORDEX
收藏 引用
6th International Conference on Electrical, Control and Instrumentation Engineering, ICECIE 2024
作者: Vishwas, M. Raghav Loknath, V. Agrawal, Vinti Mehta, Vishwa Mehul Sarasvathi, V. Computer Science and Engineering PES University Bangalore India
An end-to-end encrypted chatting application focuses on securely transmitting sensitive information. It prevents the intrusion of malicious parties with any ill intent. It is especially needed in organizations where e... 详细信息
来源: 评论
An Improved Secured Hash Algorithm(SHA1) Using Padding Index Method  1
An Improved Secured Hash Algorithm(SHA1) Using Padding Index...
收藏 引用
1st International Conference on Cyber Security and Computing, CyberComp 2024
作者: De Guzman, Larry B Salvador, Christian Ian P. Isabela State University College of Information Communication technology Isabela San Mateo Philippines
Today, hashing algorithms are employed in many applications for security purposes. Many developments have been made in the family of hashing algorithms, especially the SHA1 algorithm. Because of flaws in the past year... 详细信息
来源: 评论
A Group Ring-Based Provably Secure and Efficient Identity-Based Signature Scheme  1
收藏 引用
Congress on Smart Computing Technologies, CSCT 2023
作者: Kumar, Sunil Mittal, Gaurav Yadav, Arvind DRDO Near Metcalfe House New Delhi110054 India Department of Mathematics University of Delhi New Delhi110007 India Department of Mathematics Hansraj College University of Delhi New Delhi110007 India
Due to the advent of polynomial time quantum algorithms to solve well-known hard mathematical problems, various secure cryptographic primitives are vulnerable against large quantum computers. However, no such quantum ... 详细信息
来源: 评论