咨询与建议

限定检索结果

文献类型

  • 281 篇 会议
  • 105 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 336 篇 工学
    • 287 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 107 篇 信息与通信工程
    • 88 篇 控制科学与工程
    • 86 篇 电气工程
    • 52 篇 网络空间安全
    • 32 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 24 篇 交通运输工程
    • 24 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 137 篇 理学
    • 90 篇 数学
    • 42 篇 物理学
    • 16 篇 统计学(可授理学、...
    • 15 篇 化学
    • 11 篇 系统科学
  • 61 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 391 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 data security
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 79 篇 其他
  • 6 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
391 条 记 录,以下是81-90 订阅
MathCrypt Secure Algorithm  6
MathCrypt Secure Algorithm
收藏 引用
6th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2025
作者: Sobitha Ahila, S. Kedia, Amish Singh, Manmeet Department of Computer Science Vellore Institute of Technology Chennai Chennai India
In an era where data security is paramount, this research presents MathCrypt, a novel symmetric encryption-decryption algorithm designed to address vulnerabilities in traditional cryptographic methods. Unlike conventi... 详细信息
来源: 评论
Advancements in Isogeny-Based Cryptography: A Mathematical Approach to Post-Quantum Security
Advancements in Isogeny-Based Cryptography: A Mathematical A...
收藏 引用
2025 IEEE International Students' Conference on Electrical, Electronics and Computer Science, SCEECS 2025
作者: Soni, Abhay Singh, Sunidhi Chaturvedi, Atul Allenhouse Institute of Technology Computer Science and Engineering Kanpur India
In this paper, we have discussed isogeny-based cryptography as a rather appealing option for post-quantum security. We provide analysis of current protocols like SIDH (Supersingular Isogeny Diffie-Hellman) and SIKE (S... 详细信息
来源: 评论
An Improved Both-May Information Set Decoding Algorithm: Towards More Efficient Time-Memory Trade-Offs  16th
An Improved Both-May Information Set Decoding Algorithm: Tow...
收藏 引用
16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025
作者: Furue, Hiroki Aikawa, Yusuke NTT Social Informatics Laboratories Tokyo Japan The University of Tokyo Tokyo Japan
Code-based cryptography is based on the difficulty of the syndrome decoding problem (SDP) and is one of the promising candidates for post-quantum cryptography. Information set decoding (ISD) is known as one of th... 详细信息
来源: 评论
Fast parallel implementation of AES based on CUDA and fixed slicing technology  2
Fast parallel implementation of AES based on CUDA and fixed ...
收藏 引用
2nd International Conference on Big Data, Computational Intelligence, and Applications, BDCIA 2024
作者: Li, Kangxun Xie, Wenbo Yang, Lei Computer Science Department Guangdong University of Science and Technology Guangdong Dongguan China
With the advent of the era of big data and 5G communications' massive data, high-speed cryptographic algorithms are in demand. This paper proposes a new fast implementation of the Advanced encryption Standard (AES... 详细信息
来源: 评论
Is Internet Traffic Really Random?  15
Is Internet Traffic Really Random?
收藏 引用
15th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2025
作者: Carlson, Albert Williams, Benjamin Hiromoto, Robert E. Coats, David Singh, Mandeep Mathew, Daniel Quantum Security Alliance AustinTX United States University of Idaho Computer Science Department MoscowID United States Brigham Young University Computer Engineering Department ProvoUT United States Us Army United States MD United States
Randomness is key to many of the protocols used in cryptography, various math algorithms, and communications. However, while it is widely used it is not well understood due to its mathematical nature and foundations. ... 详细信息
来源: 评论
Research on Lightweight Cryptography Technology in Power IOT Terminal System
Research on Lightweight Cryptography Technology in Power IOT...
收藏 引用
作者: Zhang, Liang Cai, Xiang Fang, Yuan Xu, Jingxuan Sheng, Jianqiao Shen, Yuexin Information and Communication Branch of State Grid Anhui Electric Power Co. Ltd. State Grid Anhui Electric Power Co. Ltd. Anhui China
The appearance of the terminal system of electric power Internet of Things has brought a lot of convenience to the electric power industry, but at the same time it is also facing increasingly severe network security c... 详细信息
来源: 评论
AN END-TO-END GSM/SMS ENCRYPTED APPROACH FOR SMARTPHONE EMPLOYING ADVANCED encryption STANDARD (AES)
arXiv
收藏 引用
arXiv 2025年
作者: Abbas, Wasim Joshua, Salaki Reynaldo Abbas, Asim Lee, Je-Hoon Department of Electronics Information and Communication Engineering Kangwon National University Samcheok Korea Republic of Division of Computer Science Mathematics and Science St. John’s University QueensNY11439 United States
encryption is crucial for securing sensitive data during transmission over networks. Various encryption techniques exist, such as AES, DES, and RC4, with AES being the most renowned algorithm. We proposed methodology ... 详细信息
来源: 评论
Novel 2D nonlinear sine-log-sqrt-logistic map and staircase block scrambling for a rapid image encryption algorithm
收藏 引用
Journal of Information Security and Applications 2025年 92卷
作者: Wang, Meng-meng Jin, Shun-wen Wang, Hongxia Xu, Man-tao Liu, Si-hang School of Information and Control Engineering Qingdao University of Technology Qingdao266033 China College of Information Technology Shanghai Jian Qiao University Co Ltd Shanghai201315 China School of Intelligent Manufacturing Jiangxi Science and Technology Normal University Nanchang330038 China
In this paper, we propose a nonlinear 2-dimensional hyperchaotic map, called the 2D nonlinear sine-log-sqrt-logistic map (2D-NSLSLM), which introduces both the logarithmic function and the square root function. By inc... 详细信息
来源: 评论
DNA Computing: A Breakthrough in Image Cryptography - A Comprehensive Review  29
DNA Computing: A Breakthrough in Image Cryptography - A Comp...
收藏 引用
29th International Computer Conference, Computer Society of Iran, CSICC 2025
作者: Noorpoor, Hesam Shahbahrami, Asadollah Department of Computer Engineering University of Guilan Rasht Iran
Deoxyribonucleic acid-DNA computing, an interdisciplinary field at the frontier between molecular biology and computer science, has become a revolutionary field. DNA computation provides a new approach to data computa... 详细信息
来源: 评论
Study on Image encryption Methods using Various algorithms and Chaotic Map  15
Study on Image Encryption Methods using Various Algorithms a...
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Pandey, Vikas Kumar Gupta, Sanjeev Kumar Department of Electronics & Communication Engineering Rabindranath Tagore University Raisen India
Picture encryption or encoding of pictures is the techniques to safeguard picture being hacked or harmed while communicating. Such security strategy applied on communicates data starting with one hub then onto the nex... 详细信息
来源: 评论