咨询与建议

限定检索结果

文献类型

  • 65 篇 期刊文献
  • 4 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 70 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 63 篇 工学
    • 47 篇 计算机科学与技术...
    • 39 篇 电气工程
    • 22 篇 信息与通信工程
    • 22 篇 网络空间安全
    • 16 篇 电子科学与技术(可...
    • 12 篇 材料科学与工程(可...
    • 9 篇 软件工程
    • 5 篇 控制科学与工程
    • 4 篇 力学(可授工学、理...
    • 4 篇 生物医学工程(可授...
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
  • 40 篇 理学
    • 34 篇 数学
    • 4 篇 物理学
    • 3 篇 系统科学
    • 1 篇 化学
    • 1 篇 天文学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 1 篇 农学
    • 1 篇 林学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 70 篇 block cipher
  • 7 篇 linear cryptanal...
  • 6 篇 cryptanalysis
  • 4 篇 s-box
  • 4 篇 cryptography
  • 4 篇 differential cry...
  • 3 篇 aria
  • 3 篇 advanced encrypt...
  • 3 篇 security
  • 3 篇 camellia
  • 3 篇 impossible diffe...
  • 2 篇 s-boxes
  • 2 篇 square attack
  • 2 篇 lightweight cryp...
  • 2 篇 branch number
  • 2 篇 design
  • 2 篇 diffusion
  • 2 篇 differential-lin...
  • 2 篇 permutation code...
  • 2 篇 p-permutation

机构

  • 5 篇 state key labora...
  • 4 篇 department of co...
  • 3 篇 school of comput...
  • 3 篇 trusted computin...
  • 3 篇 zhengzhou inform...
  • 2 篇 key laboratory o...
  • 2 篇 shanghai key lab...
  • 2 篇 department of no...
  • 2 篇 department of ma...
  • 2 篇 state key labora...
  • 2 篇 state key labora...
  • 2 篇 university of ch...
  • 2 篇 school of mathem...
  • 2 篇 department of co...
  • 2 篇 state key labora...
  • 2 篇 school of comput...
  • 2 篇 trusted computin...
  • 2 篇 department of st...
  • 2 篇 department of ma...
  • 2 篇 state key labora...

作者

  • 4 篇 吴文玲
  • 4 篇 wu wenling
  • 3 篇 dawu gu
  • 3 篇 tariq shah
  • 3 篇 zhang lei
  • 3 篇 wei li
  • 3 篇 ya liu
  • 3 篇 zhiqiang liu
  • 2 篇 rana muhammad zu...
  • 2 篇 张文涛
  • 2 篇 guo jiansheng
  • 2 篇 冯登国
  • 2 篇 muhammad sajjad
  • 2 篇 sameh askar
  • 2 篇 hijaz ahmad
  • 2 篇 qingju wang
  • 2 篇 tong yan
  • 2 篇 luo wei
  • 2 篇 li qin
  • 2 篇 vincent rijmen

语言

  • 65 篇 英文
  • 5 篇 中文
检索条件"主题词=Block cipher"
70 条 记 录,以下是1-10 订阅
排序:
WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix
收藏 引用
Science China(Information Sciences) 2022年 第3期65卷 196-210页
作者: Jun LIU Vincent RIJMEN Yupu HU Jie CHEN Baocang WANG State Key Laboratory of Integrated Service Networks Xidian University Interuniversity Microelectronics Centre & Computer Security and Industrial Cryptography Group Department of Informatics University of Bergen
White-box cryptography aims to provide secure cryptographic primitives and implementations for the white-box attack model, which assumes that an adversary has full access to the implementation of the cryptographic alg... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
The differential fault analysis on block cipher FeW
收藏 引用
Cybersecurity 2023年 第2期6卷 62-74页
作者: Haiyan Xiao Lifang Wang Jinyong Chang School of Computer Science Northwestern Polytechnical UniversityXiAn 710055People's Republic of China Engineering University of PAP XiAn 710055People's Republic of China School of Information and Control Engineering XiAn University of Architecture and TechnologyXi'An 710055People's Republic of China State Key Laboratory of Information Security(SKLOIS) Institute of Information EngineeringChinese Academy of SciencesBeijing 100089People's Republic of China
Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et al.in 2019,which takes 64 bits plaintext as input and produces 64 bits ciphertext.As Kumar et al.said,FeW is a software oriented design with... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Designing Pair of Nonlinear Components of a block cipher over Gaussian Integers
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 5287-5305页
作者: Muhammad Sajjad Tariq Shah Robinson Julian Serna Department of Mathematics Quaid-I-Azam UniversityIslamabad45320Pakistan Escuela de Matemáticas y Estadística Universidad Pedagógica y Tecnológica de ColombiaTunja150003Columbia
In block ciphers,the nonlinear components,also known as sub-stitution boxes(S-boxes),are used with the purpose of inducing confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Nonlinear Components of a block cipher over Eisenstein Integers
收藏 引用
Computers, Materials & Continua 2023年 第12期77卷 3659-3675页
作者: Mohammad Mazyad Hazzazi Muhammad Sajjad Zaid Bassfar Tariq Shah Ashwag Albakri Department of Mathematics College of ScienceKing Khalid UniversityAbha61413Saudi Arabia Department of Mathematics Quaid-I-Azam UniversityIslamabad45320Pakistan Department of Information Technology University of TabukTabuk71491Saudi Arabia Department of Computer Science College of Computer Science&Information TechnologyJazan UniversityJazan45142Saudi Arabia
In block ciphers,the nonlinear components,also known as substitution boxes(S-boxes),are used with the purpose to induce confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the poi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A block cipher Algorithm Based on Magic Square for Secure E-bank Systems
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 1329-1346页
作者: Farah Tawfiq Abdul Hussien Abdul Monem S.Rahma Hala Bahjat Abdul Wahab Computer Science Department University of TechnologyBaghdad10011Iraq
Nowadays the E-bank systems witnessed huge growth due to the huge developments in the internet and technologies.The transmitted information represents crucial information that is exposed to various kinds of attacks.Th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Split-n-Swap: A New Modification of the Twofish block cipher Algorithm
收藏 引用
Computers, Materials & Continua 2023年 第1期74卷 1723-1734页
作者: Awny Sayed Maha Mahrous Enas Elgeldawi Computer Science Department Faculty of ScienceMinia UniversityMinia61519Egypt Faculty of Computing and Information Technology Information Technology DepartmentKing Abdulaziz UniversityJeddah21589Saudi Arabia Computer Science Department Faculty of Computers and InformationMinia UniversityMinia61519Egypt
Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern.A robust data security system should protect the information assets of any organization against cybercr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Improved RC6 block cipher Based on Data Dependent Rotations
收藏 引用
Computers, Materials & Continua 2022年 第1期70卷 1921-1934页
作者: Osama S.Faragallah Ibrahim F.Elashry Ahmed AlGhamdi Walid El-Shafai S.El-Rabaie Fathi E.Abd El-Samie Hala S.El-sayed Mohamed A.Elaskily Department of Information Technology College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Department of Electrical Communications Faculty of EngineeringKafrelsheikh UniversityKafrelsheikhEgypt Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Department of Electronics and Electrical Communications Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Department of Electrical Engineering Faculty of EngineeringMenoufia UniversityShebin El-Kom32511Egypt Department of Informatics Electronic Research Institute(ERI)CairoEgypt
This paper introduces an Improved RC6(IRC6)cipher for data encryption based on data-dependent rotations.The proposed scheme is designed with the potential of meeting the needs of the Advanced Encryption Standard(AES).... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cryptanalysis of Full-Round Magpie block cipher
收藏 引用
Chinese Journal of Electronics 2023年 第2期32卷 217-224页
作者: YANG Yunxiao SUN Bing LIU Guoqiang College of Liberal Arts and Sciences National University of Defense Technology State Key Laboratory of Cryptology Hunan Engineering Research Center of Commercial Cryptography Theory and Technology Innovation State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Science
Magpie is a lightweight block cipher proposed by Li et al. in Acta Electronica Sinica volumn 45,issue 10. It adopts an substitution-permutation network(SPN) structure with a block size of 64 bits and the key size of 9... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Continuously non-malleable codes from block ciphers in split-state model
收藏 引用
Cybersecurity 2024年 第2期7卷 68-80页
作者: Anit Kumar Ghosal Dipanwita Roychowdhury Department of Computer Science and Engineering I KharagpurKharagpurWest BengalIndia
Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to achieve.It ensures with high probability that decoded message is either completely... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Innovative Technique for Constructing Highly Non-Linear Components of block cipher for Data Security against Cyber Attacks
收藏 引用
Computer Systems Science & Engineering 2023年 第11期47卷 2547-2562页
作者: Abid Mahboob Muhammad Asif Rana Muhammad Zulqarnain Imran Siddique Hijaz Ahmad Sameh Askar Giovanni Pau Department of Mathematics Division of Science and TechnologyUniversity of EducationLahorePakistan Department of Mathematics University of Management and TechnologySialkot CampusSialkot51310Pakistan School of Mathematical Sciences Zhejiang Normal UniversityJinhua321004China Department of Mathematics University of Management and TechnologyLahorePakistan Section of Mathematics International Telematic University UninettunoCorso Vittorio Emanuele II39Roma00186Italy Department of Statistics and Operations Research College of ScienceKing Saud UniversityP.O.Box 2455Riyadh11451Saudi Arabia Faculty of Engineering and Architecturer-Kore University of Enna Enna94100Italy
The rapid advancement of data in web-based communication has created one of the biggest issues concerning the security of data carried over the internet from unauthorized access.To improve data security,modern cryptos... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论