咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
389 条 记 录,以下是41-50 订阅
排序:
A Parallel Color Image encryption Algorithm Based on a 2D Logistic-Rulkov Neuron Map
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Gao, Suo Zhang, Zheyi Ho-Ching Iu, Herbert Ding, Siqi Mou, Jun Erkan, Uğur Toktas, Abdurrahim Li, Qi Wang, Chunpeng Cao, Yinghong The School of Information Science and Engineering Dalian Polytechnic University Dalian116034 China School of Electrical Electronic and Computer Engineering The University of Western Australia Perth6009 Australia School of Mathematical Sciences Dalian University of Technology Dalian116024 China Department of Computer Engineering Faculty of Engineering Karamanoglu Mehmetbey University Karaman70200 Turkey Department of Artificial Intelligence and Data Engineering Engineering Faculty Ankara University Ankara06830 Turkey Jinan250000 China
Images are widely used in social networks, necessitating efficient and secure transmission, especially in bandwidth-constrained environments. This paper aims to develop a color image encryption algorithm that enhances... 详细信息
来源: 评论
Efficient speech encryption algorithm based on three-dimensional quadratic exponential robust chaos
收藏 引用
Applied Acoustics 2025年 235卷
作者: Huang, Yibo Li, Chong Li, Zhiyong Zhang, Qiuyu College of Physics and Electronic Engineering Northwest Normal University Lanzhou730070 China School of Mechanical Medical and Process Engineering Queensland University of Technology BrisbaneQLD4000 Australia School of Computer and Communication Lanzhou University of Technology Lanzhou730050 China
The computational accuracy and parameter spacing of the existing chaos result in the gradual degradation of the chaos, which makes the sequence become periodic sequence, and the divergence rate and divergence index of... 详细信息
来源: 评论
An Evaluation of Hashing and Other Applied Cryptography algorithms  5th
An Evaluation of Hashing and Other Applied Cryptography Algo...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Mishra, Awakash Haripriya Sharma, Apurva Thomas, Jobin S. Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bengaluru India Department of Computer Science and Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India
In the modern digital world, cryptography is critical in protecting personal statistics. Most of the cryptography algorithms used to ease data, hashing, and other implemented cryptography algorithms are extensively us... 详细信息
来源: 评论
Unclonable Commitments and Proofs  22nd
Unclonable Commitments and Proofs
收藏 引用
22nd Theory of Cryptography Conference, TCC 2024
作者: Goyal, Vipul Malavolta, Giulio Raizes, Justin NTT Research SunnyvaleCA United States Carnegie Mellon University PittsburghPA United States Bocconi University Milan Italy
Non-malleable cryptography, proposed by Dolev, Dwork, and Naor (SICOMP ’00), has numerous applications in protocol composition. In the context of proofs, it guarantees that an adversary who receives a proof cannot ma... 详细信息
来源: 评论
The Multi-Way Path Over the Blockchain: The Development of the Security Algorithm RB-24-1  6
The Multi-Way Path Over the Blockchain: The Development of t...
收藏 引用
6th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2025
作者: Rajaprakash, S. Bagath Basha, C. Rathish Babu, T.K.S. Karthik, S. Subapriya, V. Kavitha, S. Department of Computer Science & Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Tamil Nadu Chennai India Department of Computer Science & Engineering Kommuri Pratap Reddy Institute of Technology Telagana Hyderabad India Department of Computer Science & Engineering SRM Institute of Science and Technology Ramapuram Tamil Nadu Chennai India Department of Computer Science & Engineering Aarupadai Veedu Institute of Technology Vinayaka Missions Research Foundation Tamil Nadu Chennai India Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Tamil Nadu Chennai India
In the current world, a lot of new technologies are becoming famous. The Block Chain is one of these technologies. A very high amount of safety is offered by the technology in question;it is extremely robust. Users ar... 详细信息
来源: 评论
Faster algorithms for Isogeny Computations over Extensions of Finite Fields  4th
Faster Algorithms for Isogeny Computations over Extensions...
收藏 引用
4th International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024
作者: Cai, Shiping Chen, Mingjie Petit, Christophe School of Mathematics Sun Yat-sen University Guangzhou China COSIC KU Leuven Leuven Belgium University of Birmingham Birmingham United Kingdom Université libre de Bruxelles Brussels Belgium
Any isogeny between two supersingular elliptic curves can be defined over Fp2, however, this does not imply that computing such isogenies can be done with field operations in Fp2. In fact, the kernel generators o... 详细信息
来源: 评论
Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Smooth Twins and Their Isogeny-Based Applications  31st
Towards Optimally Small Smoothness Bounds for Cryptographic...
收藏 引用
31st International Conference on Selected Areas in Cryptography, SAC 2024
作者: Sterner, Bruno Institut Polytechnique de Paris Palaiseau France
We give a new approach for finding large smooth twins. Those twins whose sum is a prime are of interest in the parameter setup of certain isogeny-based cryptosystems such as SQIsign. The approach to find such twins is... 详细信息
来源: 评论
An Improved Algorithm for Code Equivalence  16th
An Improved Algorithm for Code Equivalence
收藏 引用
16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025
作者: Nowakowski, Julian Ruhr University Bochum Bochum Germany
We study the linear code equivalence problem (LEP) for linear [n, k]-codes over finite fields Fq. Recently, Chou, Persichetti and Santini gave an elegant algorithm that solves LEP over large finite fiel... 详细信息
来源: 评论
Post-Quantum Backdoor for Kyber-KEM  31st
Post-Quantum Backdoor for Kyber-KEM
收藏 引用
31st International Conference on Selected Areas in Cryptography, SAC 2024
作者: Xia, Wenwen Wang, Geng Gu, Dawu School of Cyber Engineering Xidian University Xi’an710071 China Lab of Cryptology and Computer Security Shanghai Jiao Tong University Shanghai200240 China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai200240 China
Kleptography, also known as cryptographic backdoor, poses a significant threat to cryptographic algorithms by clandestinely embedding a backdoor through the use of another cryptographic algorithm, often leveraging pub... 详细信息
来源: 评论
A Univariate Attack Against the Limited-Data Instance of Ciminion  31st
A Univariate Attack Against the Limited-Data Instance of C...
收藏 引用
31st International Conference on Selected Areas in Cryptography, SAC 2024
作者: Bariant, Augustin Inria Paris France ANSSI Paris France
With the increasing interest for advanced protocols for Multi-Party Computation, Fully-Homomorphic encryption or Zero-Knowledge proofs, a need for cryptographic algorithms with new constraints has emerged. These algor... 详细信息
来源: 评论