咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 4 篇 计算机科学与技术...
    • 4 篇 网络空间安全
    • 2 篇 信息与通信工程
    • 1 篇 电气工程
  • 3 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
  • 2 篇 军事学
    • 2 篇 军队指挥学

主题

  • 5 篇 block ciphers
  • 1 篇 matlab
  • 1 篇 s-boxes
  • 1 篇 felics
  • 1 篇 dpa
  • 1 篇 timing attacks
  • 1 篇 iot
  • 1 篇 lightweight cryp...
  • 1 篇 butterfly archit...
  • 1 篇 sca
  • 1 篇 avalanche effect...
  • 1 篇 quantum algorith...
  • 1 篇 chaotic system
  • 1 篇 spedpa
  • 1 篇 reduction
  • 1 篇 cryptanalysis
  • 1 篇 post-quantum cry...
  • 1 篇 logistic map
  • 1 篇 encryption
  • 1 篇 edge computing

机构

  • 1 篇 state key lab. o...
  • 1 篇 state key labora...
  • 1 篇 centre for smart...
  • 1 篇 school of electr...
  • 1 篇 institute of oce...
  • 1 篇 school of inform...
  • 1 篇 henan key labora...
  • 1 篇 synergetic innov...
  • 1 篇 school of comput...
  • 1 篇 institute of inf...

作者

  • 1 篇 fu xiangqun
  • 1 篇 li tan
  • 1 篇 joarder kamruzza...
  • 1 篇 吴黎明
  • 1 篇 tang ming
  • 1 篇 peng hongbo
  • 1 篇 张芳芳
  • 1 篇 li wei
  • 1 篇 qiu zhenlong
  • 1 篇 m.rubaiyat hossa...
  • 1 篇 gu dawu
  • 1 篇 hu xiaobo
  • 1 篇 sohel rana
  • 1 篇 武金波
  • 1 篇 zhang huanguo
  • 1 篇 马凤英
  • 1 篇 寇磊
  • 1 篇 yi mu
  • 1 篇 shi jianhong
  • 1 篇 bao wansu

语言

  • 5 篇 英文
检索条件"主题词=Block ciphers"
5 条 记 录,以下是1-10 订阅
排序:
General Method of Combining Grover and Simon for Attacking block ciphers
收藏 引用
China Communications 2024年 第6期21卷 237-245页
作者: Fu Xiangqun Bao Wansu Shi Jianhong Li Tan Henan Key Laboratory of Quantum Information and Cryptography PLA SSF IEUZhengzhou 450001China Synergetic Innovation Center of Quantum Information and Quantum Physics University of Science and Technology of ChinaHefei 230026China
The compatibility of different quantum algorithms should be considered when these algorithms are *** this paper,the method of combining Grover and Simon is studied for the first time,under some preconditions or ***,we... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Toward reverse engineering on secret S-boxes in block ciphers
收藏 引用
Science China(Information Sciences) 2014年 第3期57卷 169-186页
作者: TANG Ming QIU ZhenLong PENG HongBo HU XiaoBo YI Mu ZHANG HuanGuo School of Computer Science Wuhan University State Key Lab. of AIS & TC Ministry of EducationWuhan University
It has been widely accepted that the security cryptosystems should be only dependent on the security of their secret ***,there are still secret ciphers with unknown components in their commercial applications due to v... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Further Analysis of block ciphers against Timing Attacks
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1629-1632页
作者: LI Wei GU Dawu School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai 200030 China State Key Laboratory of Modern Communications Chengdu 610041 Sichuan China
Timing attacks break a cryptosystem by time measurement to recover keys. Most available countermeasures protect block ciphers based on the safety of modules. This paper gives a complete definition of timing attacks an... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Two-dimensional-lag complex logistic map with complex parameters and its encryption application
收藏 引用
Chinese Physics B 2024年 第5期33卷 324-335页
作者: 张芳芳 武金波 寇磊 马凤英 吴黎明 张雪 School of Information and Automation Engineering Qilu University of Technology (Shandong Academy of Sciences)Jinan 250353China Institute of Oceanographic Instrumentation Qilu University of Technology (Shandong Academy of Sciences)Qingdao 266000China
With the rapid development of internet technology,security protection of information has become more and more prominent,especially information *** the great advantages of chaotic encryption,we propose a 2D-lag complex... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
RBFK cipher:a randomized butterfly architecture‑based lightweight block cipher for IoT devices in the edge computing environment
收藏 引用
网络空间安全科学与技术(英文) 2023年 第3期6卷 18-36页
作者: Sohel Rana M.Rubaiyat Hossain Mondal Joarder Kamruzzaman Institute of Information and Communication Technology Bangladesh University of Engineering and TechnologyDhakaBangladesh Centre for Smart Analytics Federation University AustraliaGippslandVIC 3842Australia
Internet security has become a major concern with the growing use of the Internet of Things(IoT)and edge computing *** though data processing is handled by the edge server,sensitive data is generated and stored by the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论