咨询与建议

限定检索结果

文献类型

  • 5 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 4 篇 计算机科学与技术...
    • 2 篇 仪器科学与技术
    • 1 篇 软件工程
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 科学技术史(分学科...
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 公共管理

主题

  • 9 篇 tiny encryption ...
  • 4 篇 cryptography
  • 3 篇 parallel process...
  • 3 篇 graphics process...
  • 3 篇 field programmab...
  • 1 篇 amplitude contro...
  • 1 篇 internet of thin...
  • 1 篇 cipher
  • 1 篇 fiestel
  • 1 篇 crypto system
  • 1 篇 key generation u...
  • 1 篇 offset boosting
  • 1 篇 bit sum attack
  • 1 篇 chaotic rulkov n...
  • 1 篇 coincidence coun...
  • 1 篇 lwc
  • 1 篇 security primiti...
  • 1 篇 extended tiny en...
  • 1 篇 cryptanalysis
  • 1 篇 toy ciphers

机构

  • 1 篇 sapienza univ ro...
  • 1 篇 rose hulman inst...
  • 1 篇 southern fed uni...
  • 1 篇 lovely profess u...
  • 1 篇 nanjing univ inf...
  • 1 篇 namal coll dept ...
  • 1 篇 north caucasus f...
  • 1 篇 united technolog...
  • 1 篇 srm univ dept ec...
  • 1 篇 nanjing univ inf...
  • 1 篇 united technolog...
  • 1 篇 united technol r...
  • 1 篇 comsats inst inf...

作者

  • 2 篇 devu manikantan ...
  • 2 篇 vivek venugopal
  • 1 篇 li chunbiao
  • 1 篇 bevi a. ruhan
  • 1 篇 basan elena
  • 1 篇 khan awais
  • 1 篇 olefirenko evgen...
  • 1 篇 badar rabiah
  • 1 篇 hussain muhammad...
  • 1 篇 li yongxin
  • 1 篇 holden joshua
  • 1 篇 kaushal puneet k...
  • 1 篇 li peiran
  • 1 篇 venugopal vivek
  • 1 篇 malarvizhi s.
  • 1 篇 sobti rajeev
  • 1 篇 xia ming
  • 1 篇 lapina maria
  • 1 篇 mecella massimo
  • 1 篇 shila devu manik...

语言

  • 7 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=tiny encryption algorithm"
9 条 记 录,以下是1-10 订阅
排序:
Breaching Security of Full Round tiny encryption algorithm
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY 2018年 第1期12卷 89-98页
作者: Kaushal, Puneet Kumar Sobti, Rajeev Lovely Profess Univ Phagwara Punjab India
tiny encryption algorithm is a 64-bit block cipher designed by Wheeler and Needham in 1994 and attracted much of its attention due to its capability of reducing the hardware cost. In this paper, we introduced coincide... 详细信息
来源: 评论
Demitasse: A "Small" Version of the tiny encryption algorithm and Its Use in a Classroom Setting
收藏 引用
CRYPTOLOGIA 2013年 第1期37卷 74-83页
作者: Holden, Joshua Rose Hulman Inst Technol Dept Math Terre Haute IN 47803 USA
This article describes Demitasse, a cipher that is intended to be used by inexperienced students in a classroom setting. The cipher is based on the tiny encryption algorithm, but the parameters have been reduced in or... 详细信息
来源: 评论
Further study on the Rulkov neuron: geometric control, circuit realization and chaos-based encryption
收藏 引用
PHYSICA SCRIPTA 2024年 第7期99卷 075204-075204页
作者: Xia, Ming Li, Chunbiao Li, Yongxin Li, Peiran Khan, Awais Nanjing Univ Informat Sci & Technol Changwang Sch Honors Nanjing 210044 Peoples R China Nanjing Univ Informat Sci & Technol Sch Artificial Intelligence Nanjing 210044 Peoples R China
Rulkov neuron with various firing modes is exhaustively explored by numerical simulation aiming to disclose its unique properties of evolution. Transient chaos and the coexistence of periodic state and chaos are found... 详细信息
来源: 评论
Bi primitive switching crypto system with key generation mechanism for secure applications
收藏 引用
JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS 2014年 第4期37卷 547-555页
作者: Bevi, A. Ruhan Malarvizhi, S. SRM Univ Dept ECE Madras 603203 Tamil Nadu India
Ensuring security to the information transaction is a major challenge in the communication environment. The choice to guarantee the data transfer using a ciphering algorithm leads to high cost and complexity. The soft... 详细信息
来源: 评论
Analysis of Security Problems in Groups of Intelligent Sensors  12th
Analysis of Security Problems in Groups of Intelligent Senso...
收藏 引用
12th International Conference on Swarm Intelligence (ICSI)
作者: Grigoryan, Karen Olefirenko, Evgeniya Basan, Elena Lapina, Maria Mecella, Massimo Southern Fed Univ Chekova St 2 Taganrog 347922 Russia North Caucasus Fed Univ Pushkina St 1 Stavropol 355000 Russia Sapienza Univ Rome Via Ariosto 25 I-00185 Rome Italy
Today, the creation of intelligent sensors became possible due to the development of the hardware base, the use of small boards, where the processor, memory, and network interfaces can be placed. Examples of such card... 详细信息
来源: 评论
FPGA Based Implementation Scenarios of TEA Block Cipher  13
FPGA Based Implementation Scenarios of TEA Block Cipher
收藏 引用
13th International Conference Frontiers Information Technology (FIT 2015)
作者: Hussain, Muhammad Awais Badar, Rabiah Namal Coll Dept Elect Engn Mianwali Pakistan COMSATS Inst Informat Technol Dept Elect Engn Islamabad Pakistan
Transmission of sensitive data over some channel is a highly security constrained scenario and thus demands the application of some encryption algorithm. It is better to implement the algorithm in hardware as compared... 详细信息
来源: 评论
High Throughput Implementations of Cryptography algorithms on GPU and FPGA
High Throughput Implementations of Cryptography algorithms o...
收藏 引用
IEEE International Instrumentation and Measurement Technology Conference (I2MTC)
作者: Venugopal, Vivek Shila, Devu Manikantan United Technol Res Ctr E Hartford CT 06108 USA
Cryptography algorithms are ranked by their speed in encrypting/decrypting data and their robustness to withstand attacks. Real-time processing of data encryption/decryption is essential in network based applications ... 详细信息
来源: 评论
Hardware acceleration of TEA and XTEA algorithms on FPGA, GPU and multi-core processors (abstract only)  13
Hardware acceleration of TEA and XTEA algorithms on FPGA, GP...
收藏 引用
Proceedings of the ACM/SIGDA international symposium on Field programmable gate arrays
作者: Vivek Venugopal Devu Manikantan Shila United Technologies Research Center E Hartford CT USA
Field programmable gate arrays (FPGA) are extensively used for rapid prototyping in embedded system applications. While hardware acceleration can be done via specialized processors like a Graphical Processing Unit (GP... 详细信息
来源: 评论
High Throughput Implementations of Cryptography algorithms on GPU and FPGA
High Throughput Implementations of Cryptography algorithms o...
收藏 引用
IEEE International Instrumentation and Measurement Technology Conference
作者: Vivek Venugopal Devu Manikantan Shila United Technologies Research Center 411 Silver Lane E Hartford CT USA
Cryptography algorithms are ranked by their speed in encrypting/decrypting data and their robustness to withstand attacks. Real-time processing of data encryption/decryption is essential in network based applications ... 详细信息
来源: 评论