咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 4 篇 计算机科学与技术...
    • 2 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 网络空间安全
  • 2 篇 理学
    • 2 篇 数学
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...

主题

  • 4 篇 key schedule alg...
  • 1 篇 internet of thin...
  • 1 篇 block cipher sec...
  • 1 篇 involutive permu...
  • 1 篇 bitslicing
  • 1 篇 lightweight bloc...
  • 1 篇 secure communica...
  • 1 篇 block cipher
  • 1 篇 weak-key
  • 1 篇 independent sub-...
  • 1 篇 cryptographic de...
  • 1 篇 logistic maps
  • 1 篇 encryption
  • 1 篇 decryption
  • 1 篇 encryption analy...
  • 1 篇 gift
  • 1 篇 one-way function
  • 1 篇 hybrid cube

机构

  • 1 篇 cmr technical ca...
  • 1 篇 acharya nagarjun...
  • 1 篇 dept of computer...
  • 1 篇 khwaja fareed un...
  • 1 篇 univ tun hussein...
  • 1 篇 inpt lab multime...
  • 1 篇 department of el...
  • 1 篇 c.r. rao advance...
  • 1 篇 school of comput...

作者

  • 1 篇 kameswari u. sur...
  • 1 篇 mushtaq muhammad...
  • 1 篇 akram urooj
  • 1 篇 gupta richa
  • 1 篇 saxena ashutosh
  • 1 篇 jame sapiee
  • 1 篇 deris mustafa ma...
  • 1 篇 el kouch rachid
  • 1 篇 harmouch youssef
  • 1 篇 singh ajeet
  • 1 篇 tiwari vikas
  • 1 篇 yasmin nilufar
  • 1 篇 megat siti radhi...

语言

  • 4 篇 英文
检索条件"主题词=key schedule algorithm"
4 条 记 录,以下是1-10 订阅
排序:
key schedule algorithm using 3-Dimensional Hybrid Cubes for Block Cipher
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2019年 第8期10卷 427-442页
作者: Mushtaq, Muhammad Faheem Jame, Sapiee Megat, Siti Radhiah B. Akram, Urooj Deris, Mustafa Mat Univ Tun Hussein Onn Malaysia UTHM Fac Comp Sci & Informat Technol Batu Pahat 86400 Johor Malaysia Khwaja Fareed Univ Engn & Informat Technol Fac Comp Sci & Informat Technol Rahim Yar Khan 64200 Pakistan
A key scheduling algorithm is the mechanism that generates and schedules all session-keys for the encryption and decryption process. The key space of conventional key schedule algorithm using the 2D hybrid cubes is no... 详细信息
来源: 评论
The benefit of using chaos in key schedule algorithm
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2019年 45卷 143-155页
作者: Harmouch, Youssef El Kouch, Rachid INPT Lab Multimedia Signal & Commun Syst Dept Math Comp & Networks Rabat Morocco
Many ciphers suffer from weak-key issues. This problem is due to the simplicity of the key schedule algorithm. Unfortunately, the cipher designers have not paid much attention to the sub-keys generation as the cipher ... 详细信息
来源: 评论
Design and analysis of key scheduling algorithm for symmetric cipher security
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第6期16卷 3991-3997页
作者: Tiwari, Vikas Kameswari, U. Surya Singh, Ajeet Saxena, Ashutosh Acharya Nagarjuna University Andhra Pradesh Guntur 522510 India C.R. Rao Advanced Institute of Mathematics Statistics and Computer Science University of Hyderabad Campus Telangana Hyderabad 500046 India Dept of Computer Science and Engineering Acharya Nagarjuna University Andhra Pradesh Guntur 522510 India School of Computing Science and Engineering Vellore Institute of Technology VIT Bhopal University Bhopal-Indore Highway Madhya Pradesh Bhopal 466114 India CMR Technical Campus Telangana Hyderabad 501401 India
The success and safety of block cipher systems heavily depend on how efficient and secure their key schedule algorithms (KSAs) are, especially when fighting against cryptanalytic attacks. This paper proposes a novel K... 详细信息
来源: 评论
Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第4期16卷 2647-2659页
作者: Yasmin, Nilufar Gupta, Richa Department of Electronics & Communication Engineering Jaypee Institute of Information Technology Uttar Pradesh Noida India
The internet of things (IoT) ensures flexible network services to the end devices connected to it. Although security has always been a concern for such networks. There are several effective cryptographic protocols int... 详细信息
来源: 评论