咨询与建议

限定检索结果

文献类型

  • 52 篇 期刊文献
  • 7 篇 学位论文
  • 4 篇 会议

馆藏范围

  • 63 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 49 篇 工学
    • 32 篇 计算机科学与技术...
    • 12 篇 电子科学与技术(可...
    • 12 篇 网络空间安全
    • 9 篇 材料科学与工程(可...
    • 9 篇 电气工程
    • 8 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 3 篇 机械工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 生物医学工程(可授...
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 软件工程
    • 1 篇 生物工程
  • 30 篇 理学
    • 19 篇 数学
    • 7 篇 物理学
    • 6 篇 系统科学
    • 2 篇 天文学
    • 1 篇 生物学
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 63 篇 s-box
  • 12 篇 aes
  • 4 篇 image encryption
  • 4 篇 block cipher
  • 4 篇 des
  • 4 篇 nonlinearity
  • 3 篇 遗传算法
  • 3 篇 aes算法
  • 3 篇 混沌系统
  • 3 篇 有限域
  • 2 篇 混沌
  • 2 篇 composite field ...
  • 2 篇 查找表
  • 2 篇 hardware impleme...
  • 2 篇 高级加密标准
  • 2 篇 lfsr
  • 2 篇 图像加密
  • 2 篇 cryptanalysis
  • 2 篇 音箱
  • 2 篇 流水线

机构

  • 3 篇 国防科学技术大学
  • 3 篇 college of compu...
  • 2 篇 department of ma...
  • 2 篇 school of mathem...
  • 2 篇 guangxi key labo...
  • 2 篇 department of st...
  • 2 篇 department of ma...
  • 2 篇 department of ap...
  • 2 篇 department of ma...
  • 1 篇 department of ba...
  • 1 篇 college of compu...
  • 1 篇 北京交通大学
  • 1 篇 dept.of computer...
  • 1 篇 东南大学
  • 1 篇 faculty of engin...
  • 1 篇 university of ch...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 国防科技大学
  • 1 篇 department of co...

作者

  • 3 篇 amer aljaedi
  • 3 篇 tariq shah
  • 3 篇 mohammad mazyad ...
  • 2 篇 rana muhammad zu...
  • 2 篇 谷晓辰
  • 2 篇 杨君辉
  • 2 篇 sameh askar
  • 2 篇 hijaz ahmad
  • 2 篇 丁文霞
  • 2 篇 戴宗铎
  • 2 篇 majid khan
  • 2 篇 曾肯成
  • 2 篇 yongzhuang wei
  • 2 篇 sajjad shaukat j...
  • 2 篇 muhammad asif
  • 2 篇 iqtadar hussain
  • 2 篇 abid mahboob
  • 1 篇 赵耿
  • 1 篇 zhang xiaoqiang
  • 1 篇 shi tairong

语言

  • 32 篇 中文
  • 31 篇 英文
检索条件"主题词=S-Box"
63 条 记 录,以下是1-10 订阅
排序:
A High Efficiency Hardware Implementation of s-boxes Based on Composite Field for Advanced Encryption standard
收藏 引用
Journal of Computer and Communications 2024年 第4期12卷 228-246页
作者: Yawen Wang sini Bin shikai Zhu Xiaoting Hu College of Computer science & Technology Jiangsu Normal University Xuzhou China
The subBytes (s-box) transformation is the most crucial operation in the AEs algorithm, significantly impacting the implementation performance of AEs chips. To design a high-performance s-box, a segmented optimization... 详细信息
来源: 维普期刊数据库 维普期刊数据库 博看期刊 评论
Implementation of an 8-bit bit-slice AEs s-box with rapid single flux quantum circuits
收藏 引用
Chinese Physics B 2022年 第9期31卷 604-610页
作者: 杨若婷 薛新伊 杨树澄 高小平 任洁 严伟 王镇 state Key Laboratory of Functional Material for Informatics Shanghai Institute of Microsystem and Information TechnologyChinese Academy of SciencesShanghai 200050China CAs Center for Excellence in superconducting Electronics(CENsE) Shanghai 200050China University of Chinese Academy of sciences Beijing 100049China school of software and Microelectronics Peking UniversityBeijing 100871China
Rapid single flux quantum(RsFQ)circuits are a kind of superconducting digital circuits,having properties of a natural gate-level pipelining synchronous sequential circuit,which demonstrates high energy efficiency and ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Novel s-box GenerationMethodology Based on the Optimized GANModel
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 1911-1927页
作者: Runlian Zhang Rui shu Yongzhuang Wei Hailong Zhang Xiaonian Wu Guangxi Key Laboratory of Cryptography and Information security Guilin University of Electronic TechnologyGuilin541004China state Key Laboratory of Information security Institute of Information EngineeringChinese Academy of SciencesBeijing100085China
s-boxes can be the core component of block ciphers,and how to efficiently generate s-boxes with strong cryptographic properties appears to be an important task in the design of block ciphers.In this work,an optimized ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Novel quantum circuit implementation of Advanced Encryption standard with low costs
收藏 引用
science China(Physics,Mechanics & Astronomy) 2022年 第9期65卷 11-26页
作者: ZhenQiang Li BinBin Cai HongWei sun HaiLing Liu LinChun Wan suJuan Qin QiaoYan Wen Fei Gao state Key Laboratory of Networking and switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China state Key Laboratory of Cryptology Beijing 100878China
In this study, we examine how the quantum circuit of the Advanced Encryption standard(AEs) can be optimized from two aspects, i.e., number of qubits and T-depth. To reduce the number of qubits, we present three kinds ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A New s-box Design system for Data Encryption Using Artificial Bee Colony Algorithm
收藏 引用
Computers, Materials & Continua 2023年 第10期77卷 781-797页
作者: Yazeed Yasin Ghadi Mohammed sAlshehri sultan Almakdi Oumaima saidani Nazik Alturki Fawad Masood Muhammad shahbaz Khan Department of Computer science Al Ain UniversityAbu Dhabi112612United Arab Emirates Department of Computer science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Electrical Engineering Institute of Space TechnologyIslamabad4400Pakistan school of Computing Engineering and the Built EnvironmentEdinburgh Napier UniversityEdinburghEH105DTUK
securing digital image data is a key concern in today’s information-driven society.Effective encryption techniques are required to protect sensitive image data,with the substitution-box(s-box)often playing a pivotal ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Design of Nonlinear Components Over a Mordell Elliptic Curve on Galois Fields
收藏 引用
Computers, Materials & Continua 2022年 第4期71卷 1313-1329页
作者: Hafeez ur Rehman Tariq shah Amer Aljaedi Mohammad Mazyad Hazzazi Adel RAlharbi Department of Mathematics Quaid-i-Azam UniversityIslamabadPakistan College of Computing and Information Technology University of TabukTabuk71491Saudi Arabia Department of Mathematics College of ScienceKing Khalid UniversityAbhaSaudi Arabia
Elliptic curve cryptography ensures more safety and reliability than other public key cryptosystems of the same key size.In recent years,the use of elliptic curves in public-key cryptography has increased due to their... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Atmospheric Convection Model Based Digital Confidentiality scheme
收藏 引用
Computers, Materials & Continua 2022年 第6期71卷 4503-4522页
作者: Noor Munir Majid Khan Mohammad Mazyad Hazzazi Amer Aljaedi sajjad shaukat Jamal Iqtadar Hussain Department of Applied Mathematics and statistics Institute of Space TechnologyIslamabadPakistan Department of Mathematics College of ScienceKing Khalid UniversityAbha61413Saudi Arabia College of Computing and Information Technology University of TabukTabuk71491Saudi Arabia Department of Mathematics Statistics and PhysicsQatar UniversityDoha2713Qatar
Nonlinear dynamics is a fascinating area that is intensely affecting a wide range of different disciplines of science and technology globally.The combination of different innovative topics of information security and ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel Approach for security Enhancement of Data Encryption standard
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 5073-5086页
作者: Dawood shah Tariq shah sajjad shaukat Jamal Mohammad Mazyad Hazzazi Amer Aljaedi Adel R.Alharbi Department of Mathematics Quaid-i-Azam UniversityIslamabadPakistan Department of Mathematics College of ScienceKing Khalid UniversityAbhaSaudi Arabia College of Computing and Information Technology University of TabukTabuk71491Saudi Arabia
Data Encryption standard(DEs)is a symmetric key cryptosystem that is applied in different cryptosystems of recent times.However,researchers found defects in the main assembling of the DEs and declared it insecure agai... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Mathematical Approach for Generating a Highly Non-Linear substitution box Using Quadratic Fractional Transformation
收藏 引用
Computers, Materials & Continua 2023年 第11期77卷 2565-2578页
作者: Abid Mahboob Muhammad Asif Rana Muhammad Zulqarnain Imran saddique Hijaz Ahmad sameh Askar Department of Mathematics Division of Science and TechnologyUniversity of EducationLahorePakistan Department of Mathematics University of Management and TechnologySialkot Campus51310Pakistan school of Mathematical sciences Zhejiang Normal UniversityJinhua321004China Department of Mathematics University of Management and TechnologyLahore54770Pakistan section of Mathematics International Telematic University UninettunoCorso Vittorio Emanuele IIRoma39-00186Italy Department of statistics and Operations Research College of ScienceKing Saud UniversityP.O.Box 2455Riyadh11451Saudi Arabia
Nowadays,one of the most important difficulties is the protection and privacy of confidential data.To address these problems,numerous organizations rely on the use of cryptographic techniques to secure data from illeg... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Innovative Technique for Constructing Highly Non-Linear Components of Block Cipher for Data security against Cyber Attacks
收藏 引用
Computer systems science & Engineering 2023年 第11期47卷 2547-2562页
作者: Abid Mahboob Muhammad Asif Rana Muhammad Zulqarnain Imran siddique Hijaz Ahmad sameh Askar Giovanni Pau Department of Mathematics Division of Science and TechnologyUniversity of EducationLahorePakistan Department of Mathematics University of Management and TechnologySialkot CampusSialkot51310Pakistan school of Mathematical sciences Zhejiang Normal UniversityJinhua321004China Department of Mathematics University of Management and TechnologyLahorePakistan section of Mathematics International Telematic University UninettunoCorso Vittorio Emanuele II39Roma00186Italy Department of statistics and Operations Research College of ScienceKing Saud UniversityP.O.Box 2455Riyadh11451Saudi Arabia Faculty of Engineering and Architecturer-Kore University of Enna Enna94100Italy
The rapid advancement of data in web-based communication has created one of the biggest issues concerning the security of data carried over the internet from unauthorized access.To improve data security,modern cryptos... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论