咨询与建议

限定检索结果

文献类型

  • 60 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 101 篇 工学
    • 64 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 11 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 107 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 101 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=hash algorithm"
107 条 记 录,以下是1-10 订阅
排序:
Guided hash algorithm for Information Semantic Retrieval in Multimedia Environment
收藏 引用
IEEE ACCESS 2024年 12卷 6864-6878页
作者: Zhao, Xiaojuan Weinan Normal Univ Sch Humanities Weinan 714099 Peoples R China
With technological progress, how to efficiently process and retrieve large amounts of multi-modal multimedia data has become a challenge. Although multi-modal hash algorithms have been applied in this field, their per... 详细信息
来源: 评论
Feasibility study of a novel hash algorithm-based neutron activation analysis system for arms control treaty verification
收藏 引用
NUCLEAR ENGINEERING AND TECHNOLOGY 2024年 第4期56卷 1330-1338页
作者: He, Xiao-Suo Dai, Yao-Dong He, Xiao-Tao He, Qing-Hua Nanjing Univ Aeronaut & Astronaut Coll Mat Sci & Technol Nanjing 211106 Peoples R China Nanjing Univ Aeronaut & Astronaut Key Lab Nucl Technol Applicat & Radiat Protect Ast Minist Ind & Informat Technol Nanjing 211106 Peoples R China
Information on isotopic composition and geometric structure is necessary for identifying a true warhead. Nevertheless, such classified information should be protected physically or electronically. With a novel hash en... 详细信息
来源: 评论
A characteristic standardization method for circuit input vectors based on hash algorithm
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2022年 第3期13卷 1505-1513页
作者: Shi, Ying Huang, Shuyi Lou, Jungang Huzhou Univ Qiuzhen Coll Huzhou 313000 Peoples R China Huzhou Univ Zhejiang Prov Key Lab Smart Management & Applicat Huzhou 313000 Peoples R China Huzhou Univ Sch Informat Engn Huzhou 313000 Peoples R China
The lengths of input vectors corresponding to different circuits are often quite different, which makes it difficult to standardize them. This paper proposes a characteristic standardization method for circuit input v... 详细信息
来源: 评论
Information Retrieval Method of Natural Resources Data based on hash algorithm
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2023年 第3期14卷 950-955页
作者: Li, Qian Guangxi Vocat Normal Univ Coll Comp & Informat Engn Nanning 530007 Peoples R China
In order to improve the ability of searching and identifying information in natural resources data, this paper puts forward a method of searching information in natural resources data based on hash algorithm. Through ... 详细信息
来源: 评论
BentSign: keyed hash algorithm based on bent Boolean function and chaotic attractor
收藏 引用
BULLETIN OF THE POLISH ACADEMY OF SCIENCES-TECHNICAL SCIENCES 2019年 第3期67卷 557-569页
作者: Todorova, M. Stoyanov, B. Szczypiorski, K. Graniszewski, W. Kordov, K. Konstantin Preslaysky Univ Shumen 115 Univ Ska Str Shumen 9712 Bulgaria Warsaw Univ Technol Pl Politech 1 PL-00661 Warsaw Poland
In this study, we propose a novel keyed hash algorithm based on a Boolean function and chaotic attractor. The hash algorithm called BentSign is based on two Signature attractors and XOR function and a bent Boolean fun... 详细信息
来源: 评论
Synthesis of an Application Specific Instruction Set Processor (ASIP) for RIPEMD-160 hash algorithm
收藏 引用
International Journal of Electronics Letters 2019年 第2期7卷 154-165页
作者: Safaei Mehrabani, Yavar Department of Computer Engineering Varamin-Pishva Branch Islamic Azad University Varamin Iran
hash functions are vital tasks in many applications such as digital fingerprinting, Internet communications, bank transactions and so forth. RACE Integrity Primitives Evaluation Message Digest-160 (RIPEMD-160) is one ... 详细信息
来源: 评论
hash algorithm Optimization for Long-span Digital Currency Transactions based on Multi-constraint Optimization
Hash Algorithm Optimization for Long-span Digital Currency T...
收藏 引用
作者: Jianqiang Li South China Agricultural University
Block chain technology and satellite integration to achieve wide-area security transactions has become a hot topic in the field of information security. It will face two major problems: the real-time transmission of l... 详细信息
来源: 评论
Data Preservation by hash algorithm for matrix multiplication over venomous cloud  5
Data Preservation by hash algorithm for matrix multiplicatio...
收藏 引用
5th IEEE International Conference on Parallel, Distributed and Grid Computing (PDGC)
作者: Goel, Gaurav Tiwari, Rajeev Rishiwal, Vinay Upadhyay, Shuchi COE CGC CSE Landran Mohali India UPES CSE Dehra Dun India MJP Rohilkhand Univ Bareilly UP India Univ Dehradun UCALS Uttaranchal India
In today Scenario various organizations, business are dependent on Cloud Computing. This paper focus on security issues in cloud computing. People Stores their confidential data on cloud storage and Cloud Service is a... 详细信息
来源: 评论
Application of Improved Image hash algorithm in Image Tamper Detection
Application of Improved Image Hash Algorithm in Image Tamper...
收藏 引用
作者: Deng Juan Zhou Bing Shi YiLiang Faculty of Information Engineering City CollegeWuhan University of Science and Technology
In order to study the application of improved image hashing algorithm in image tampering detection,based on compressed sensing and ring segmentation,a new image hashing technique is *** image hash algorithm based on c... 详细信息
来源: 评论
The ASIC Implementation of SM3 hash algorithm for High Throughput
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2016年 第7期E99A卷 1481-1487页
作者: Du, Xiaojing Li, Shuguo Tsinghua Univ Inst Microelect Tsinghua Natl Lab Informat Sci & Technol Beijing 100084 Peoples R China
SM3 is a hash function standard defined by China. Unlike SHA-1 and SHA-2, it is hard for SM3 to speed up the throughput because it has more complicated compression function than other hash algorithm. In this paper, we... 详细信息
来源: 评论