咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
  • 2 篇 工学
    • 2 篇 电气工程
    • 1 篇 仪器科学与技术
    • 1 篇 计算机科学与技术...

主题

  • 4 篇 symmetric-key al...
  • 1 篇 partial latin sq...
  • 1 篇 classification o...
  • 1 篇 mutual informati...
  • 1 篇 wireless fading ...
  • 1 篇 isomorphism
  • 1 篇 affine algebraic...
  • 1 篇 real-time monito...
  • 1 篇 fiber bragg grat...
  • 1 篇 secret key
  • 1 篇 secure hash algo...
  • 1 篇 optical receiver
  • 1 篇 security module
  • 1 篇 quantum cryptogr...
  • 1 篇 cryptography
  • 1 篇 image pattern
  • 1 篇 sensor node

机构

  • 1 篇 elect & telecomm...
  • 1 篇 china informat t...
  • 1 篇 chinese acad sci...
  • 1 篇 imr gwangju 6100...
  • 1 篇 univ seville dep...
  • 1 篇 southern illinoi...

作者

  • 1 篇 kim kyeeun
  • 1 篇 kim kyungsoo
  • 1 篇 park siwoong
  • 1 篇 chen dongqing
  • 1 篇 gudiel felix
  • 1 篇 azizi sima
  • 1 篇 komaee arash
  • 1 篇 xiang chong
  • 1 篇 falcon raul m.
  • 1 篇 kim hyunjin
  • 1 篇 alvarez victor
  • 1 篇 heo young soon
  • 1 篇 kang hyun seo
  • 1 篇 yang li
  • 1 篇 yeo chanil
  • 1 篇 park hyoung-jun
  • 1 篇 peng young

语言

  • 4 篇 英文
检索条件"主题词=symmetric-key algorithm"
4 条 记 录,以下是1-10 订阅
排序:
A computational algebraic geometry approach to analyze pseudo-random sequences based on Latin squares
收藏 引用
ADVANCES IN COMPUTATIONAL MATHEMATICS 2019年 第4期45卷 1769-1792页
作者: Falcon, Raul M. Alvarez, Victor Gudiel, Felix Univ Seville Dept Appl Math 1 Seville Spain
Latin squares are used as scramblers on symmetric-key algorithms that generate pseudo-random sequences of the same length. The robustness and effectiveness of these algorithms are respectively based on the extremely l... 详细信息
来源: 评论
The Classification of Quantum symmetric-key Encryption Protocols  3
The Classification of Quantum Symmetric-Key Encryption Proto...
收藏 引用
Conference on Quantum and Nonlinear Optics III
作者: Xiang, Chong Yang, Li Peng, Young Chen, Dongqing China Informat Technol Secur Evaluat Ctr Beijing 100085 Peoples R China Chinese Acad Sci Data Assurance & Commun Secur Res Ctr Beijing 100093 Peoples R China
The classification of quantum symmetric-key encryption protocol is presented. According to five elements of a quantum symmetric-key encryption protocol: plaintext, ciphertext, key, encryption algorithm and decryption ... 详细信息
来源: 评论
Empirical Bounds on the Rate of Secret Bits Extracted from Received Signal Strength  53
Empirical Bounds on the Rate of Secret Bits Extracted from R...
收藏 引用
53rd Annual Conference on Information Sciences and Systems (CISS)
作者: Azizi, Sima Komaee, Arash Southern Illinois Univ Dept Elect & Comp Engn Carbondale IL 62901 USA
symmetric cryptography relies on pairs of identical secret keys shared by the legitimate communicating parties. To implement a symmetric-key algorithm for cryptography, a major concern is to develop secure methods for... 详细信息
来源: 评论
A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module
收藏 引用
SENSORS 2021年 第5期21卷 1620-1620页
作者: Kim, Kyeeun Park, Siwoong Yeo, Chanil Park, Hyoung-Jun Kim, Hyunjin Heo, Young Soon Kang, Hyun Seo Kim, Kyungsoo Elect & Telecommun Res Inst Opt ICT Convergence Sect Gwangju 34129 South Korea IMR Gwangju 61008 South Korea
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastruc... 详细信息
来源: 评论