咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 105 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 390 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 285 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 105 篇 信息与通信工程
    • 87 篇 控制科学与工程
    • 85 篇 电气工程
    • 51 篇 网络空间安全
    • 32 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 136 篇 理学
    • 89 篇 数学
    • 42 篇 物理学
    • 15 篇 化学
    • 15 篇 统计学(可授理学、...
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 390 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 6 篇 aes
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 rsa
  • 5 篇 des
  • 5 篇 encryption
  • 4 篇 ecc
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 307 篇 英文
  • 79 篇 其他
  • 6 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
390 条 记 录,以下是41-50 订阅
排序:
An Algorithmic Approach to (2,2)-Isogenies in the Theta Model and Applications to Isogeny-Based Cryptography  30th
An Algorithmic Approach to (2,2)-Isogenies in the Theta Mode...
收藏 引用
30th International Conference on the Theory and Application of Cryptology and Information Security
作者: Dartois, Pierrick Maino, Luciano Pope, Giacomo Robert, Damien Univ Bordeaux CNRS UMR 5251 IMBBordeaux INP Bordeaux France INRIA IMB UMR 5251 F-33400 Talence France Univ Bristol Bristol Avon England NCC Grp Cheltenham Glos England
In this paper, we describe an algorithm to compute chains of (2, 2)-isogenies between products of elliptic curves in the theta model. The description of the algorithm is split into various subroutines to allow for a p... 详细信息
来源: 评论
Deepface-based chaotic image encryption using key optimization and semi-tensor product theory
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Ding, Dawei Xie, Dong Zhang, Hongwei Yang, Zongli Liu, Chu'an Anhui university School of Electronic Information Engineering Hefei230601 China
Currently, protecting personal privacy through selective encryption of facial images has become a research hotspot. This paper aims to design a new image encryption scheme using chaotic systems, optimization algorithm... 详细信息
来源: 评论
Efficient speech encryption algorithm based on three-dimensional quadratic exponential robust chaos
收藏 引用
Applied Acoustics 2025年 235卷
作者: Huang, Yibo Li, Chong Li, Zhiyong Zhang, Qiuyu College of Physics and Electronic Engineering Northwest Normal University Lanzhou730070 China School of Mechanical Medical and Process Engineering Queensland University of Technology BrisbaneQLD4000 Australia School of Computer and Communication Lanzhou University of Technology Lanzhou730050 China
The computational accuracy and parameter spacing of the existing chaos result in the gradual degradation of the chaos, which makes the sequence become periodic sequence, and the divergence rate and divergence index of... 详细信息
来源: 评论
Faster algorithms for Isogeny Computations over Extensions of Finite Fields  4th
Faster Algorithms for Isogeny Computations over Extensions...
收藏 引用
4th International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024
作者: Cai, Shiping Chen, Mingjie Petit, Christophe School of Mathematics Sun Yat-sen University Guangzhou China COSIC KU Leuven Leuven Belgium University of Birmingham Birmingham United Kingdom Université libre de Bruxelles Brussels Belgium
Any isogeny between two supersingular elliptic curves can be defined over Fp2, however, this does not imply that computing such isogenies can be done with field operations in Fp2. In fact, the kernel generators o... 详细信息
来源: 评论
The Smart and Secured Communication Using Applied Cryptography algorithms  5th
The Smart and Secured Communication Using Applied Cryptograp...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Agarwal, Trapty Jebakumari, S. Adlin Hemlata Ayesha, Amreen Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Department of Computer Science and Information Technology Jain University Karnataka Bangalore India Department of Computer Science & Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Manduwala Dehradun Navgaon India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India
This paper describes the implementation of a at ease communication device the usage of an implemented cryptography algorithm. The gadget is designed to provide comfy statistics and voice communique between endpoints u... 详细信息
来源: 评论
Hybrid Ultra-Lightweight Algorithm: Hummingbird-2 and PRESENT with a Chaotic System  2nd
Hybrid Ultra-Lightweight Algorithm: Hummingbird-2 and PRESEN...
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Khanjar, Ibtihal Ali Hoomod, Haider K. Yousif, Intisar Abd Education College Mustansiriyah University Baghdad Iraq
Computing in the cloud is a burgeoning sector that requires architectures that are both lightweight and safe. In this study, we suggest a strong hybrid structure that is created by fusing existing structures of HUMMIN... 详细信息
来源: 评论
A Univariate Attack Against the Limited-Data Instance of Ciminion  31st
A Univariate Attack Against the Limited-Data Instance of C...
收藏 引用
31st International Conference on Selected Areas in Cryptography, SAC 2024
作者: Bariant, Augustin Inria Paris France ANSSI Paris France
With the increasing interest for advanced protocols for Multi-Party Computation, Fully-Homomorphic encryption or Zero-Knowledge proofs, a need for cryptographic algorithms with new constraints has emerged. These algor... 详细信息
来源: 评论
Area and Power Efficient Modified Karatsuba Multiplier for Error-Free Cryptography algorithms  1
Area and Power Efficient Modified Karatsuba Multiplier for E...
收藏 引用
1st International Conference on Intelligent Systems and Computational Networks, ICISCN 2025
作者: Neelima, K. Hemalatha, Kanumuri Bhavana, Nagella Karthik, Parapu Kumar, Satrapu Sai Mohan Babu University Erstwhile Sree Vidyanikethan Engineering College Department of Ece Tirupati India Sree Vidyanikethan Engineering College Department of Ece Tirupati India
Data security and authentication are critical in cryptography, especially in elliptic curve cryptography (ECC), where usage of efficient finite field multipliers becomes essential. However, these multipliers consume s... 详细信息
来源: 评论
Bit Security: Optimal Adversaries, Equivalence Results, and a Toolbox for Computational-Statistical Security Analysis  22nd
Bit Security: Optimal Adversaries, Equivalence Results, and...
收藏 引用
22nd Theory of Cryptography Conference, TCC 2024
作者: Micciancio, Daniele Schultz-Wu, Mark University of California San Diego United States
We investigate the notion of bit-security for decisional cryptographic properties, as originally proposed in (Micciancio & Walter, Eurocrypt 2018), and its main variants and extensions, with the goal clarifying th... 详细信息
来源: 评论
A Novel Key Generation Algorithm Utilizing Lattice-Based Cryptography Principles  3rd
A Novel Key Generation Algorithm Utilizing Lattice-Based Cry...
收藏 引用
3rd International Conference on Computing and Communication Networks, ICCCN 2023
作者: Arul, Rajakumar Sivaselvam, B. Choudhary, Ankush Centre for Smart Grid Technologies Vellore Institute of Technology Chennai India Department of Computer Science and Engineering IIITDM Kancheepuram Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India
Technology advancement is inevitable, and it has created a revolution in all the sectors creating huge opportunities. Artificial intelligence and machine learning have boosted the advancement of all the sectors making... 详细信息
来源: 评论