咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 25 篇 期刊文献

馆藏范围

  • 53 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 32 篇 计算机科学与技术...
    • 24 篇 电气工程
    • 12 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 石油与天然气工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 航空宇航科学与技...
  • 11 篇 理学
    • 5 篇 物理学
    • 3 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 天文学
    • 1 篇 地球物理学
  • 5 篇 医学
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
  • 5 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 2 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 法学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 53 篇 secure hash algo...
  • 8 篇 cryptography
  • 7 篇 advanced encrypt...
  • 5 篇 data encryption ...
  • 5 篇 fpga
  • 3 篇 message digest
  • 3 篇 public key crypt...
  • 3 篇 data encryption ...
  • 3 篇 security
  • 3 篇 aes
  • 3 篇 hash function
  • 2 篇 internet of thin...
  • 2 篇 rivest-shamir-ad...
  • 2 篇 third party audi...
  • 2 篇 elliptic curve c...
  • 2 篇 field programmab...
  • 2 篇 color image encr...
  • 2 篇 image encryption
  • 2 篇 md5
  • 2 篇 sha-3

机构

  • 2 篇 school of scienc...
  • 1 篇 sri krishna coll...
  • 1 篇 xian univ posts ...
  • 1 篇 shaanxi univ tec...
  • 1 篇 katholieke univ ...
  • 1 篇 elect & telecomm...
  • 1 篇 univ western ont...
  • 1 篇 china natl digit...
  • 1 篇 shaanxi xiyu hig...
  • 1 篇 natl chiao tung ...
  • 1 篇 maharashtra pune
  • 1 篇 vascage res ctr ...
  • 1 篇 dy patil coll en...
  • 1 篇 department of co...
  • 1 篇 arunai engn coll...
  • 1 篇 chungbuk natl un...
  • 1 篇 gndec dept elect...
  • 1 篇 univ western mac...
  • 1 篇 computer enginee...
  • 1 篇 chennai inst tec...

作者

  • 2 篇 lee chen-yu
  • 2 篇 ragupathy r.
  • 2 篇 lin chu-hsing
  • 2 篇 xuling jin
  • 2 篇 yeh yi-shiung
  • 2 篇 seetharaman k.
  • 2 篇 jian zhang
  • 1 篇 holler r.
  • 1 篇 liang hao
  • 1 篇 kim kyeeun
  • 1 篇 chien shih-pei
  • 1 篇 lee eun-hee
  • 1 篇 chen teng-yun
  • 1 篇 kiechl stefan
  • 1 篇 wang yuliang
  • 1 篇 kim kyungsoo
  • 1 篇 li tianlun
  • 1 篇 luo chun-li
  • 1 篇 park siwoong
  • 1 篇 adhvaryu rachit

语言

  • 49 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"主题词=secure hash algorithm"
53 条 记 录,以下是1-10 订阅
排序:
Generalized secure hash algorithm: SHA-X
Generalized secure hash algorithm: SHA-X
收藏 引用
IEEE EUROCON-International Conference on Computer As A Tool
作者: Lin, Chu-Hsing Yeh, Yi-Shiung Chien, Shih-Pei Lee, Chen-Yu Chien, Hung-Sheng Department of Computer Science Tunghai University Taichung Taiwan
This paper defines a generalized SHA algorithm based on the SHA family rules. The proposed algorithm accepts arbitrary length message as input to generate message digest with the required length. It contains the initi... 详细信息
来源: 评论
AN EFFICIENT FAULT DETECTION SCHEME FOR THE secure hash algorithm SHA-512
AN EFFICIENT FAULT DETECTION SCHEME FOR THE SECURE HASH ALGO...
收藏 引用
International Conference on Green Energy and Conversion Systems (GECS)
作者: Kahri, Fatma Mestiri, Hassen Bouallegue, Belgacem Machhout, Mohsen Univ Monastir Fac Sci Monastir Elect & Microelect Lab Monastir Tunisia
To protect the implementation of the standard secure hash algorithm (SHA) against attacks. We have proposed a number of countermeasures. This paper present a proposed new fault detection scheme. It is based on the hyb... 详细信息
来源: 评论
Research of hash-based secure key expansion algorithm for practical QKD
收藏 引用
OPTIK 2013年 第15期124卷 2273-2276页
作者: Wang, Jian Luo, Chun-li Lin, Sheng-zhao Zhang, Hong-fei Cui, Ke Liang, Hao Jin, Ge Zhou, Lei Chen, Teng-yun Univ Sci & Technol China Dept Modern Phys Anhui Key Lab Phys Elect State Key Lab Particle Detect & Elect Hefei 230026 Anhui Peoples R China Hefei Natl Lab Phys Sci Microscale Hefei 230026 Anhui Peoples R China
The quantum key distribution (QKD) system has been developed rapidly, but its key generation rate is limited for kinds of reason such as detector efficiency and not fitted for high speed application such as video conf... 详细信息
来源: 评论
Securing the edge: privacy-preserving federated learning for insider threats in IoT networks
收藏 引用
JOURNAL OF SUPERCOMPUTING 2025年 第1期81卷 1-49页
作者: Kamatchi, K. Uma, E. Anna Univ Coll Engn Guindy Dept Informat Sci & Technol Chennai 600025 India
Insider threats in Internet of Things (IoT) networks pose significant risks, as compromised devices can misuse their privileges to cause substantial harm. Centralized methods for insider threat detection in IoT device... 详细信息
来源: 评论
Modified Elliptic Curve Cryptography Multi-Signature Scheme to Enhance Security in Cryptocurrency
收藏 引用
Computer Systems Science & Engineering 2023年 第4期45卷 641-658页
作者: G.Uganya Radhika Baskar Department of Electronics and Communication Engineering Saveetha School of EngineeringSIMATSChennaiTamil NaduIndia
Internet of Things(IoT)is an emerging technology that moves the world in the direction of smart ***,IoT security is the complex problem due to its centralized architecture,and limited ***,blockchain technology has gre... 详细信息
来源: 评论
Implementation of high-speed SHA-1 architecture
收藏 引用
IEICE ELECTRONICS EXPRESS 2009年 第16期6卷 1174-1179页
作者: Lee, Eun-Hee Lee, Je-Hoon Park, Il-Hwan Cho, Kyoung-Rok Chungbuk Natl Univ Chungbuk Informat Tech Ctr BK21 Cheongju 361763 South Korea Natl Secur Res Inst Taejon South Korea
This paper proposes a new SHA-1 architecture to exploit higher parallelism and to shorten the critical path for hash operations. It enhances a performance without significant area penalty. We implemented the proposed ... 详细信息
来源: 评论
Revised elliptic curve cryptography multi-signature scheme (RECC-MSS) for enhancing security in electronic health record (EHR) system
收藏 引用
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2023年 第6期45卷 11993-12012页
作者: Uganya, G. Bommi, R. M. Krishnammal, P. Muthu Vijayaraj, N. Vel Tech Rangarajan Dr Sagunthal R&D Inst Sci & T Dept Elect & Commun Engn Chennai Tamil Nadu India Chennai Inst Technol Dept Elect & Commun Engn Chennai Tamil Nadu India VIT AP Univ Sch Elect Engn Amaravati Andhra Pradesh India Vel Tech Rangarajan Dr Sagunthal R&D Inst Sci & T Dept Comp Sci & Engn Chennai Tamil Nadu India
Internet of things (IoT) is a recent developing technology in the field of smart healthcare. But it is difficult to transfer the patient's health record as a centralized network. So, "blockchain technology&qu... 详细信息
来源: 评论
Homogenized Chebyshev-Arnold Map and Its Application to Color Image Encryption
收藏 引用
IEEE ACCESS 2019年 7卷 114459-114471页
作者: Kang, Xuejing Luo, Xuanshu Zhang, Xuesong Jiang, Jing Beijing Univ Posts & Telecommun Sch Comp Sci Beijing 100876 Peoples R China Beijing Union Univ Dept Commun Engn Beijing 100101 Peoples R China
In this paper, we propose a homogenized Chebyshev-Arnold map (HCAM) by homogenizing the linear coupling of Chebyshev map and Arnold map. The proposed HCAM has complex dynamical behaviors and can avoid the problems of ... 详细信息
来源: 评论
A Fault Detection Scheme for the FPGA Implementation of SHA-1 and SHA-512 Round Computations
收藏 引用
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS 2011年 第4期27卷 517-530页
作者: Bahramali, Mohsen Jiang, Jin Reyhani-Masoleh, Arash Univ Western Ontario Dept Elect & Comp Engn London ON Canada
The secure hash algorithm is the most popular hash function currently used in many security protocols such as SSL and IPSec. Like other cryptographic algorithms, the hardware implementation of hash functions is of gre... 详细信息
来源: 评论
Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic algorithms
收藏 引用
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2013年 第5期29卷 889-905页
作者: Lin, Chu-Hsing Lee, Chen-Yu Kavi, Krishna M. Chen, Deng-Jyi Yeh, Yi-Shiung Tunghai Univ Dept Comp Sci Taichung 407 Taiwan Natl Chiao Tung Univ Dept Comp Sci Hsinchu 300 Taiwan Univ N Texas Dept Comp Sci & Engn Denton TX 76203 USA
One-way hash functions play an important role in modem cryptography. Matusiewicz et al. proved that the message scheduling is essential for the security of SHA-256 by showing that it is possible to find collisions wit... 详细信息
来源: 评论