咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 25 篇 期刊文献

馆藏范围

  • 53 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 32 篇 计算机科学与技术...
    • 24 篇 电气工程
    • 12 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 石油与天然气工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 航空宇航科学与技...
  • 11 篇 理学
    • 5 篇 物理学
    • 3 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 天文学
    • 1 篇 地球物理学
  • 5 篇 医学
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
  • 5 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 2 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 法学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 53 篇 secure hash algo...
  • 8 篇 cryptography
  • 7 篇 advanced encrypt...
  • 5 篇 data encryption ...
  • 5 篇 fpga
  • 3 篇 message digest
  • 3 篇 public key crypt...
  • 3 篇 data encryption ...
  • 3 篇 security
  • 3 篇 aes
  • 3 篇 hash function
  • 2 篇 internet of thin...
  • 2 篇 rivest-shamir-ad...
  • 2 篇 third party audi...
  • 2 篇 elliptic curve c...
  • 2 篇 field programmab...
  • 2 篇 color image encr...
  • 2 篇 image encryption
  • 2 篇 md5
  • 2 篇 sha-3

机构

  • 2 篇 school of scienc...
  • 1 篇 sri krishna coll...
  • 1 篇 xian univ posts ...
  • 1 篇 shaanxi univ tec...
  • 1 篇 katholieke univ ...
  • 1 篇 elect & telecomm...
  • 1 篇 univ western ont...
  • 1 篇 china natl digit...
  • 1 篇 shaanxi xiyu hig...
  • 1 篇 natl chiao tung ...
  • 1 篇 maharashtra pune
  • 1 篇 vascage res ctr ...
  • 1 篇 dy patil coll en...
  • 1 篇 department of co...
  • 1 篇 arunai engn coll...
  • 1 篇 chungbuk natl un...
  • 1 篇 gndec dept elect...
  • 1 篇 univ western mac...
  • 1 篇 computer enginee...
  • 1 篇 chennai inst tec...

作者

  • 2 篇 lee chen-yu
  • 2 篇 ragupathy r.
  • 2 篇 lin chu-hsing
  • 2 篇 xuling jin
  • 2 篇 yeh yi-shiung
  • 2 篇 seetharaman k.
  • 2 篇 jian zhang
  • 1 篇 holler r.
  • 1 篇 liang hao
  • 1 篇 kim kyeeun
  • 1 篇 chien shih-pei
  • 1 篇 lee eun-hee
  • 1 篇 chen teng-yun
  • 1 篇 kiechl stefan
  • 1 篇 wang yuliang
  • 1 篇 kim kyungsoo
  • 1 篇 li tianlun
  • 1 篇 luo chun-li
  • 1 篇 park siwoong
  • 1 篇 adhvaryu rachit

语言

  • 49 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"主题词=secure hash algorithm"
53 条 记 录,以下是31-40 订阅
排序:
On the Implementation of McEliece with CCA2 Indeterminacy by SHA-3
On the Implementation of McEliece with CCA2 Indeterminacy by...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Ghosh, Santosh Intel Corp Intel Labs Secur & Privacy Res Hillsboro OR 97124 USA
This paper deals with the design and implementation of the post-quantum public-key algorithm McEliece. Seamless incorporation of a new error generator and new SHA-3 module provides higher indeterminacy and more random... 详细信息
来源: 评论
Hardware Acceleration of SHA-256 algorithm using NIOS-II Processor  8
Hardware Acceleration of SHA-256 Algorithm using NIOS-II Pro...
收藏 引用
8th International Conference on Modern Circuit and System Technologies (MOCAST)
作者: Sideris, Argirios Sanida, Theodora Dasygenis, Minas Univ Western Macedonia Dept Informat & Telecommun Engn Kozani 50131 Greece
Cryptography plays a leading role in the information transmission security. Even though encrypted, data can be altered when transmitted over a network. Therefore, to verify data the use of a digital signature is essen... 详细信息
来源: 评论
Ultra High Throughput Implementations for MD5 hash algorithm on FPGA
Ultra High Throughput Implementations for MD5 Hash Algorithm...
收藏 引用
2nd International Conference on High Performance Computing and Applications
作者: Wang, Yuliang Zhao, Qiuxia Jiang, Liehui Shao, Yi China Natl Digital Switching Syst Engn & Technol Zhengzhou 450002 Peoples R China
This paper first presents a new architecture of MD5, which achieved the theoretical upper bound on throughput in the iterative architecture. And then based on the general proposed architecture, this paper implemented ... 详细信息
来源: 评论
LOCATION AWARE SELECTIVE UNLOCKING & secure VERIFICATION SAFER CARD FORENHANCING RFID SECURITY BY USING SHA-3.  2
LOCATION AWARE SELECTIVE UNLOCKING & SECURE VERIFICATION SAF...
收藏 引用
2nd IEEE International Conference on Advances in Computing and Communication Engineering (ICACCE)
作者: Dakhore, Sagar Lohiya, Padma DY Patil Coll Engn Dept E&TC Commun Network Pune Maharashtra India DY Patil Coll Engn Dept E&TC Pune Maharashtra India
In This Paper, we report a new approach for providing security as well as privacy to the corporate user. With the help of locations sensing mechanism by using GPS we can avoid the un-authorized reading & relay att... 详细信息
来源: 评论
Applying secure Authentication Scheme to Protect DNS from Rebinding Attack Using Proxy
Applying Secure Authentication Scheme to Protect DNS from Re...
收藏 引用
International Conference on Circuit, Power and Computing Technologies (ICCPCT)
作者: Pandiaraja, P. Parasuraman, S. Arunai Engn Coll Dept Comp Sci & Engn Thiruvannamalai Tamil Nadu India
Internet is critical to both the economy and society in today's world. Domain Name System (DNS) is a key building block of the internet and the DNS hides all technical infrastructures, software and hardware requir... 详细信息
来源: 评论
NMACA Approach Used to Build a secure Message Authentication Code
NMACA Approach Used to Build a Secure Message Authentication...
收藏 引用
International Conference on Security Technology/International Conference on Disaster Recovery and Business Continuity
作者: Alosaimy, Raed Alghathbar, Khaled Hafez, Alaaeldin M. Eldefrawy, Mohamed H. King Saud Univ Ctr Excellence Informat Assurance CoEIA Riyadh 11451 Saudi Arabia
secure storage systems should consider the integrity and authentication of long-term stored information. When information is transferred through communication channels, different types of digital information can be re... 详细信息
来源: 评论
Encryption System Design Based On DES And SHA-1
Encryption System Design Based On DES And SHA-1
收藏 引用
11th International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES)
作者: Zhang, Jian Jin, Xuling Univ Civil Engn & Architecture Sch Sci Beijing Peoples R China
For modern society, The concealment and completeness of data is particularly important. To solve this problem, developed a mixed DES and SHA-1 encryption system based on VC + + environment. The system on the one hand ... 详细信息
来源: 评论
Design of Hyper Elliptic Curve Digital Signature
Design of Hyper Elliptic Curve Digital Signature
收藏 引用
International Conference on Information Technology and Computer Science
作者: Deng Jian-zhi Cheng Xiao-hui Gui Qiong Guilin Univ Technol Dept Elect & Comp Sci Guilin Peoples R China
In computer cryptography, Hyper elliptic curve cryptography system is one of the best cryptography system. DSA signature algorithm is also an advanced digital signature algorithm. In this paper, it's banded hyper ... 详细信息
来源: 评论
A secure Elliptic Curve Digital Signature Scheme for Embedded Devices
A Secure Elliptic Curve Digital Signature Scheme for Embedde...
收藏 引用
2nd International Conference on Signals, Circuits and Systems
作者: Wajih, El Hadj Youssef Mohsen, Machhout Rached, Tourki Elect & Microelect Lab Dept Phys Fac Sci Monastir Monastir Tunisia
Random numbers are fundamental to all aspects of data security. The strength of a security mechanism is directly proportional to the randomness of the numbers it uses. These numbers are provided by special algorithms ... 详细信息
来源: 评论
secure Cancelable Fingerprint Key Generation  6
Secure Cancelable Fingerprint Key Generation
收藏 引用
6th IEEE Power India International Conference (PIICON)
作者: Bhatega, Aditi Sharma, Kapil Delhi Technol Univ Delhi India
The strength of present day cryptosystem lies mainly in the key used for encryption. The problem to remember, protect and manage private key is a major issue in case of asymmetric ciphers. By using proven one way math... 详细信息
来源: 评论