咨询与建议

限定检索结果

文献类型

  • 8 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 6 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 机械工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 软件工程
  • 2 篇 理学
    • 2 篇 数学

主题

  • 11 篇 hash algorithms
  • 2 篇 cryptography
  • 1 篇 shazam algorithm
  • 1 篇 chaotic hashing
  • 1 篇 online resources
  • 1 篇 secure hashing a...
  • 1 篇 w-band
  • 1 篇 fpgas
  • 1 篇 gpgpu
  • 1 篇 sha-224
  • 1 篇 microgrids
  • 1 篇 one time passwor...
  • 1 篇 prototyping
  • 1 篇 sha-512
  • 1 篇 error-free data ...
  • 1 篇 ecdsa
  • 1 篇 md5
  • 1 篇 phishing
  • 1 篇 speech retrieval
  • 1 篇 lock contentions

机构

  • 1 篇 ibm corp thomas ...
  • 1 篇 birla inst techn...
  • 1 篇 iowa state univ ...
  • 1 篇 telecom sudparis...
  • 1 篇 cent police univ...
  • 1 篇 univ roma tor ve...
  • 1 篇 state key labora...
  • 1 篇 northwest normal...
  • 1 篇 hainan institute...
  • 1 篇 visvesvaraya tec...
  • 1 篇 nova se univ sch...
  • 1 篇 bharati vidyapee...
  • 1 篇 tafila tech univ...
  • 1 篇 changhua cty pol...
  • 1 篇 mississippi stat...
  • 1 篇 padmabhushan vas...
  • 1 篇 college of elect...
  • 1 篇 yuan ze univ dep...

作者

  • 1 篇 laurent maryline
  • 1 篇 chan chien-lung
  • 1 篇 cheneau tony
  • 1 篇 de luise a
  • 1 篇 donglian qi
  • 1 篇 huang yi-bo
  • 1 篇 khan samee u.
  • 1 篇 xianbo wang
  • 1 篇 sudarshan t. s. ...
  • 1 篇 shaikh alam
  • 1 篇 ganesh t. s.
  • 1 篇 ke hung-jui
  • 1 篇 li yi-an
  • 1 篇 pratesi m
  • 1 篇 yunfeng yan
  • 1 篇 yulin chen
  • 1 篇 chen ms
  • 1 篇 huang jia-hung
  • 1 篇 yu ps
  • 1 篇 tout hicham

语言

  • 10 篇 英文
  • 1 篇 其他
检索条件"主题词=hash algorithms"
11 条 记 录,以下是1-10 订阅
排序:
Design and Optimized Implementation of the SHA-2(256,384,512) hash algorithms
Design and Optimized Implementation of the SHA-2(256,384,512...
收藏 引用
2007 7th International Conference on ASIC Electronic Version(ASICON 2007)
作者: Wanzhong Sun,Hongpeng Guo,Huilei He,Zibin Dai Institute of Electronic Technology,Information Engineering University,Zhengzhou 450004,China
Coupled with the increasing demand for strong secure data transmission in communications,SHA-2 hash family is becoming the newest powerful hash function *** this paper,a reconfigurable architecture is *** architecture... 详细信息
来源: 评论
hash-based FDI attack-resilient distributed self-triggered secondary frequency control for islanded microgrids
收藏 引用
Global Energy Interconnection 2025年 第1期8卷 1-12页
作者: Xing Huang Yulin Chen Donglian Qi Yunfeng Yan Shaohua Yang Ying Weng Xianbo Wang College of Electrical Engineering Zhejiang UniversityHangzhou 310027PR China Hainan Institute of Zhejiang University Sanya 572000PR China State Key Laboratory of Internet of Things for Smart City University of Macao999078Macao Special Administrative Region of China
Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational *** distributed secondary control with a small,fixed sampling time period ine... 详细信息
来源: 评论
Optimal design of multiple hash tables for concurrency control
收藏 引用
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 1997年 第3期9卷 384-390页
作者: Chen, MS Yu, PS IBM CORP THOMAS J WATSON RES CTRYORKTOWN HTSNY 10598
In this paper, we propose the approach of using multiple hash tables for lock requests with different data access patterns to minimize the number of false contentions in a data sharing environment. We first derive som... 详细信息
来源: 评论
hashchip: A shared-resource multi-hash function processor architecture on FPGA
收藏 引用
INTEGRATION-THE VLSI JOURNAL 2007年 第1期40卷 11-19页
作者: Ganesh, T. S. Frederick, M. T. Sudarshan, T. S. B. Somani, A. K. Iowa State Univ Dependable Comp & Networking Lab Ames IA 50011 USA Birla Inst Technol & Sci Pilani 333031 Rajasthan India
The ubiquitous presence of mobile devices and the demand for better performance and efficiency have motivated research into embedded implementations of cryptography algorithms. In this paper, we propose and explore mu... 详细信息
来源: 评论
Concerns about hash cracking - Aftereffect on authentication procedures in applications of cyberspace
收藏 引用
IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE 2007年 第1期22卷 3-7页
作者: Wang, Shiuh-Jeng Ke, Hung-Jui Huang, Jia-Hung Chan, Chien-Lung Cent Police Univ Dept Informat Management Tao Yuan 333 Taiwan Changhua Cty Police Bur Informat Management Off Changhua 500 Taiwan Yuan Ze Univ Dept Informat Management Taoyuan 333 Taiwan
In the Crypto 2004 conference [6], one of the big news was that a fundamental technique in Cryptography - one of the hash algorithms, Message Digest 5 (MD5) had been cracked. Soon after this event, it was announced th... 详细信息
来源: 评论
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU
收藏 引用
COMPUTERS & SECURITY 2010年 第4期29卷 419-431页
作者: Cheneau, Tony Boudguiga, Aymen Laurent, Maryline TELECOM SudParis Inst TELECOM CNRS Samovar UMR 5157 F-91011 Evry France
Cryptographically Generated Addresses (CGA) are today mainly used with the Secure Neighbor Discovery Protocol (SEND). Despite CGA generalization, current standards only show how to construct CGA with the RSA algorithm... 详细信息
来源: 评论
Error-free transmission in a W-band satellite channel
收藏 引用
SPACE COMMUNICATIONS 2003年 第2期19卷 91-100页
作者: Pratesi, M Ruggieri, M De Luise, A Univ Roma Tor Vergata Dept Elect Engn I-00133 Rome Italy
The Data Collection Experiment (DCE) of the scientific mission DAVID (Data and Video Interactive Distribution) of the Italian Space Agency will pioneer the use of the W-band for telecommunications experiments. In part... 详细信息
来源: 评论
A modified secure hash design to circumvent collision and length extension attacks
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022年 71卷
作者: Al-Odat, Zeyad A. Khan, Samee U. Al-Qtiemat, Eman Tafila Tech Univ Tafila Jordan Mississippi State Univ Mississippi State MS USA
This paper introduces an improved version of the secure hash algorithms, SHA-1, and SHA-2. The proposed work produces a strengthened secure hash design using the fusion between the SHA-1 and SHA-2 hash standards. This... 详细信息
来源: 评论
Implementation and comparison of the functions of building blocks in SHA-2 family used in secured cloud applications
收藏 引用
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY 2019年 第2期22卷 323-335页
作者: Leekha, Alka Shaikh, Alam Visvesvaraya Technol Univ Belgaum 590018 Karnataka India Bharati Vidyapeeth Coll Engn New Delhi 110063 India Padmabhushan Vasantdada Patil Pratishthans Coll E Mumbai 400022 Maharashtra India
A Secure hash algorithm is grounded on the principles of message digest algorithms that are used in the design of the algorithms like MD4 and MD5. The main application of this algorithm is that it can be used in secur... 详细信息
来源: 评论
PHISHPIN: AN INTEGRATED, IDENTITY-BASED ANTI-PHISHING APPROACH
PHISHPIN: AN INTEGRATED, IDENTITY-BASED ANTI-PHISHING APPROA...
收藏 引用
International Conference on Security and Cryptography
作者: Tout, Hicham Nova SE Univ Sch Comp & Informat Sci Ft Lauderdale FL 33314 USA
Phishing is a social engineering technique used to fraudulently acquire sensitive information from users by masquerading as a legitimate entity. One of the primary goals of phishing is to illegally carry fraudulent fi... 详细信息
来源: 评论