咨询与建议

限定检索结果

文献类型

  • 61 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 108 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 102 篇 工学
    • 65 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 12 篇 软件工程
    • 11 篇 控制科学与工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 108 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 102 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=hash algorithm"
108 条 记 录,以下是1-10 订阅
排序:
The ASIC Implementation of SM3 hash algorithm for High Throughput
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2016年 第7期E99A卷 1481-1487页
作者: Du, Xiaojing Li, Shuguo Tsinghua Univ Inst Microelect Tsinghua Natl Lab Informat Sci & Technol Beijing 100084 Peoples R China
SM3 is a hash function standard defined by China. Unlike SHA-1 and SHA-2, it is hard for SM3 to speed up the throughput because it has more complicated compression function than other hash algorithm. In this paper, we... 详细信息
来源: 评论
Improving the multicast state scalability in internet routers by integrating hash algorithm with recursive unicast
收藏 引用
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2007年 第4期30卷 1445-1454页
作者: Al-Talib, S. A. Ali, B. M. Khatun, S. Subramaniam, S. Univ Putra Malaysia Dept Comp & Commun Syst Serdang 43400 Malaysia Univ Putra Malaysia Dept Commun Technol & Networks Serdang 43400 Malaysia
In this article, a new protocol called REhash has been devised that gracefully integrates the idea of recursive unicast with hash algorithm to achieve scalable multicast for improved performance. In this model, data p... 详细信息
来源: 评论
A characteristic standardization method for circuit input vectors based on hash algorithm
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2022年 第3期13卷 1505-1513页
作者: Shi, Ying Huang, Shuyi Lou, Jungang Huzhou Univ Qiuzhen Coll Huzhou 313000 Peoples R China Huzhou Univ Zhejiang Prov Key Lab Smart Management & Applicat Huzhou 313000 Peoples R China Huzhou Univ Sch Informat Engn Huzhou 313000 Peoples R China
The lengths of input vectors corresponding to different circuits are often quite different, which makes it difficult to standardize them. This paper proposes a characteristic standardization method for circuit input v... 详细信息
来源: 评论
BentSign: keyed hash algorithm based on bent Boolean function and chaotic attractor
收藏 引用
BULLETIN OF THE POLISH ACADEMY OF SCIENCES-TECHNICAL SCIENCES 2019年 第3期67卷 557-569页
作者: Todorova, M. Stoyanov, B. Szczypiorski, K. Graniszewski, W. Kordov, K. Konstantin Preslaysky Univ Shumen 115 Univ Ska Str Shumen 9712 Bulgaria Warsaw Univ Technol Pl Politech 1 PL-00661 Warsaw Poland
In this study, we propose a novel keyed hash algorithm based on a Boolean function and chaotic attractor. The hash algorithm called BentSign is based on two Signature attractors and XOR function and a bent Boolean fun... 详细信息
来源: 评论
Guided hash algorithm for Information Semantic Retrieval in Multimedia Environment
收藏 引用
IEEE ACCESS 2024年 12卷 6864-6878页
作者: Zhao, Xiaojuan Weinan Normal Univ Sch Humanities Weinan 714099 Peoples R China
With technological progress, how to efficiently process and retrieve large amounts of multi-modal multimedia data has become a challenge. Although multi-modal hash algorithms have been applied in this field, their per... 详细信息
来源: 评论
A New hash algorithm Exploiting Triple-state Bucket Directory for Flash Storage Devices
收藏 引用
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS 2016年 第4期62卷 398-404页
作者: Kim, Bo-kyeong Kang, Joo-Young Lee, Dong-Ho Hanyang Univ Dept Comp Sci & Engn Seoul South Korea
Recently, the flash storage device becomes more important to the mobile consumer electronics that supports various functionalities because of its portability and reliability. The capacity of the flash storage device i... 详细信息
来源: 评论
Feasibility study of a novel hash algorithm-based neutron activation analysis system for arms control treaty verification
收藏 引用
NUCLEAR ENGINEERING AND TECHNOLOGY 2024年 第4期56卷 1330-1338页
作者: He, Xiao-Suo Dai, Yao-Dong He, Xiao-Tao He, Qing-Hua Nanjing Univ Aeronaut & Astronaut Coll Mat Sci & Technol Nanjing 211106 Peoples R China Nanjing Univ Aeronaut & Astronaut Key Lab Nucl Technol Applicat & Radiat Protect Ast Minist Ind & Informat Technol Nanjing 211106 Peoples R China
Information on isotopic composition and geometric structure is necessary for identifying a true warhead. Nevertheless, such classified information should be protected physically or electronically. With a novel hash en... 详细信息
来源: 评论
The hash algorithm of the Network Equipment Performance Evaluation
收藏 引用
INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING 2013年 第2期6卷 117-126页
作者: Zou, Xin Zhou, Li Gong, Liangyi Natl Comp network Emergency Response Tech Team Co Beijing Peoples R China Harbin Engn Univ Comp Sci & Technol Dept Harbin Peoples R China Harbin Inst Technol Dept Sci & Technol Harbin Peoples R China Harbin Inst Technol Harbin Peoples R China Beihang Univ Beijing Peoples R China
At present the hash algorithm analysis is mostly confined to the randomness of the hash values. Researchers have not analyzed the effect of hash algorithm in the network equipment. We propose three evaluation measures... 详细信息
来源: 评论
Synthesis of an Application Specific Instruction Set Processor (ASIP) for RIPEMD-160 hash algorithm
收藏 引用
International Journal of Electronics Letters 2019年 第2期7卷 154-165页
作者: Safaei Mehrabani, Yavar Department of Computer Engineering Varamin-Pishva Branch Islamic Azad University Varamin Iran
hash functions are vital tasks in many applications such as digital fingerprinting, Internet communications, bank transactions and so forth. RACE Integrity Primitives Evaluation Message Digest-160 (RIPEMD-160) is one ... 详细信息
来源: 评论
Implementation of Efficient SHA-256 hash algorithm for Secure Vehicle Communication using FPGA  11
Implementation of Efficient SHA-256 Hash Algorithm for Secur...
收藏 引用
International SoC Design Conference (ISOCC)]
作者: Jeong, Chanbok Kim, Youngmin UNIST Sch Elect & Comp Engn UNIST Gil 50 Ulsan 689798 South Korea
In this paper, we implement the SHA-256 FPGA hardware module for the security protocol of the IEEE 1609.2 vehicle communication (VC). VC requires high-throughput and low-latency hardware architectures. For fast and ef... 详细信息
来源: 评论