咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
389 条 记 录,以下是51-60 订阅
排序:
ECPM Cryptanalysis Resource Estimation  25th
ECPM Cryptanalysis Resource Estimation
收藏 引用
25th International Conference on Information Security Applications, WISA 2024
作者: Putranto, Dedy Septono Catur Wardhani, Rini Wisnu Cho, Jaehan Kim, Howon IoT Research Center Pusan National University Busan609735 Korea Republic of Blockchain Platform Research Center Pusan National University Busan609735 Korea Republic of South Korea School of Computer Science and Engineering Pusan National University Busan609735 Korea Republic of
Elliptic Curve Point Multiplication (ECPM) is a key component of the Elliptic Curve Cryptography (ECC) hierarchy protocol. However, the specific estimation of resources required for this process remains underexplored ... 详细信息
来源: 评论
A Novel Key Generation Algorithm Utilizing Lattice-Based Cryptography Principles  3rd
A Novel Key Generation Algorithm Utilizing Lattice-Based Cry...
收藏 引用
3rd International Conference on Computing and Communication Networks, ICCCN 2023
作者: Arul, Rajakumar Sivaselvam, B. Choudhary, Ankush Centre for Smart Grid Technologies Vellore Institute of Technology Chennai India Department of Computer Science and Engineering IIITDM Kancheepuram Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India
Technology advancement is inevitable, and it has created a revolution in all the sectors creating huge opportunities. Artificial intelligence and machine learning have boosted the advancement of all the sectors making... 详细信息
来源: 评论
Area and Power Efficient Modified Karatsuba Multiplier for Error-Free Cryptography algorithms  1
Area and Power Efficient Modified Karatsuba Multiplier for E...
收藏 引用
1st International Conference on Intelligent Systems and Computational Networks, ICISCN 2025
作者: Neelima, K. Hemalatha, Kanumuri Bhavana, Nagella Karthik, Parapu Kumar, Satrapu Sai Mohan Babu University Erstwhile Sree Vidyanikethan Engineering College Department of Ece Tirupati India Sree Vidyanikethan Engineering College Department of Ece Tirupati India
Data security and authentication are critical in cryptography, especially in elliptic curve cryptography (ECC), where usage of efficient finite field multipliers becomes essential. However, these multipliers consume s... 详细信息
来源: 评论
Efficient Theta-Based algorithms for Computing (,)-Isogenies on Kummer Surfaces for Arbitrary Odd  16th
Efficient Theta-Based Algorithms for Computing (,)-Isogenie...
收藏 引用
16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025
作者: Yoshizumi, Ryo Onuki, Hiroshi Ohashi, Ryo Kudo, Momonari Nuida, Koji Kyushu University Fukuoka Japan The University of Tokyo Tokyo Japan Fukuoka Institute of Technology Fukuoka Japan National Institute of Advanced Industrial Science and Technology Tokyo Japan
Isogeny-based cryptography is one of the candidates for post-quantum cryptography. Recently, several isogeny-based cryptosystems using isogenies between Kummer surfaces were proposed. Most of those cryptosystems use (... 详细信息
来源: 评论
Lightweight security Mechanism for IoT Applications using Substitution-Box  4
Lightweight security Mechanism for IoT Applications using Su...
收藏 引用
4th IEEE International Conference on Artificial Intelligence in Cybersecurity, ICAIC 2025
作者: Hanif, Fozia Shams, Rehan Waheed, Urooj University of Karachi Department of Mathematics Karachi Pakistan Sir Syed University of Engineering and Technology Karachi Department of Telecommunication Pakistan DHA Suffa University Karachi Department of Computer Science Pakistan
In recent times the use of small computing devices for gathering information from the real world is increasing day by day. The devices like wireless sensors, RIFD tags, embedded devices and IoT devices are required to... 详细信息
来源: 评论
An Asymmetric Single Channel encryption Mechanism Using Unequal Modulus and QZS Algorithm in Fractional Fourier Transform  1st
An Asymmetric Single Channel Encryption Mechanism Using Uneq...
收藏 引用
1st International Conference on Innovation and Emerging Trends in Computing and Information Technologies, IETCIT 2024
作者: Rakheja, Pankaj Kashyap, Neeti The NorthCap University Gurugram India
The proposed cipher mechanism entails the encryption of a three - channel coloured input image into a single-channel encrypted image by means of QZS algorithm. Initially R, G and B components are processed parallelly,... 详细信息
来源: 评论
Design of Image encryption Technique Using MSE Approach  14th
Design of Image Encryption Technique Using MSE Approach
收藏 引用
14th International Conference on Applications and Techniques in Information Security, ATIS 2024
作者: Manikandan, C. Rabinson, A. Prince Devibala, A. Sivanesh, M. Karunyaa, S. Rajesh, A. School of Electrical and Electronics Engineering SASTRA Deemed University Tamil Nadu Thanjavur613401 India
The recent bloom in digital technology and the internet has created many ways to share information. The images are the most commonly used to share the information. Securely sharing of images is essential. Image encryp... 详细信息
来源: 评论
Protection of IoT networks: cryptographic solutions for cybersecurity management  3
Protection of IoT networks: cryptographic solutions for cybe...
收藏 引用
3rd International Conference on Cyber Hygiene and Conflict Management in Global Information Networks, CH and CMiGIN 2024
作者: Faure, Emil Rozlomii, Inna Yarmilko, Andrii Naumenko, Serhii Cherkasy State Technological University Shevchenko Blvd. 460 Cherkasy18006 Ukraine Kyiv03142 Ukraine Bohdan Khmelnytsky National University of Cherkasy Shevchenko Blvd. 81 Cherkasy18031 Ukraine
In the modern world, where the Internet of Things (IoT) is gaining increasing prevalence and importance, the issue of data security becomes a key challenge for both organizations and individual users. With the growing... 详细信息
来源: 评论
A Data Migration Scheme Based on State Secret Algorithm
A Data Migration Scheme Based on State Secret Algorithm
收藏 引用
2025 Asia-Europe Conference on Cybersecurity, Internet of Things and Soft Computing, CITSC 2025
作者: Xing, Xiaokui Li, Shukun An, Ran Hu, Leilei Beijing Smartchip Microelectronics Technology Company Limited Beijing China
Improper data migration and use will have the risk of information leakage, this article introduces a data migration and use scheme, which is based on state secret algorithm. In different platforms of data migration sc... 详细信息
来源: 评论
Cryptanalysis of an Efficient Signature Based on Isotropic Quadratic Forms  16th
Cryptanalysis of an Efficient Signature Based on Isotropi...
收藏 引用
16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025
作者: Bambury, Henry Nguyen, Phong Q. DIENS École normale supérieure PSL University CNRS Inria Paris France DGA Paris France
We present a key-recovery attack on DEFI, an efficient signature scheme proposed recently by Feussner and Semaev, and based on isotropic quadratic forms, borrowing from both multivariate and lattice cryptography. Our ... 详细信息
来源: 评论