全文获取类型
收费全文 | 78篇 |
免费 | 5篇 |
国内免费 | 3篇 |
专业分类
综合类 | 5篇 |
金属工艺 | 2篇 |
机械仪表 | 4篇 |
建筑科学 | 2篇 |
石油天然气 | 2篇 |
无线电 | 23篇 |
一般工业技术 | 2篇 |
原子能技术 | 5篇 |
自动化技术 | 41篇 |
出版年
2022年 | 1篇 |
2021年 | 1篇 |
2020年 | 5篇 |
2017年 | 2篇 |
2016年 | 1篇 |
2014年 | 4篇 |
2013年 | 4篇 |
2012年 | 4篇 |
2011年 | 5篇 |
2010年 | 4篇 |
2009年 | 2篇 |
2008年 | 9篇 |
2007年 | 11篇 |
2006年 | 3篇 |
2005年 | 4篇 |
2004年 | 1篇 |
2003年 | 8篇 |
2002年 | 1篇 |
2001年 | 1篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 4篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1987年 | 1篇 |
排序方式: 共有86条查询结果,搜索用时 15 毫秒
31.
《国际计算机数学杂志》2012,89(10):1405-1415
In this paper, an improved common-multiplicand-multiplication algorithm is proposed, utilizing the binary exponentiation method and minimal-signed-digit recoding technique for fast exponentiation. By adopting the recoding technique on the common signed-digit representations in the grouped exponent substrings, the proposed algorithm provides an efficient exponentiation method. The proposed algorithm achieves better performance in modern exponentiation methods by decreasing the overall computational complexity. In particular, the proposed method is very suitable for parallel processing systems to improve the efficiency of exponentiation operation. 相似文献
32.
33.
一种高效率的RSA模幂算法的研究 总被引:6,自引:2,他引:4
RSA硬件的执行效率主要取决于模幂运算的实现效率。该文旨在介绍一种引入中国剩余定理加速私钥操作,并采用Barret模缩减方法,避开除法运算,将模幂运算转换成三个乘法运算和一个加法运算的快速模幂算法及其硬件实现方法。在乘法运算的实现中,采用Booth乘法器,可以大大缩短电路的关键路径,显著地提高硬件的执行效率。 相似文献
34.
《国际计算机数学杂志》2012,89(7):805-809
The multiplication operations in GF(2m) fields are widely used in cryptosystems. However, the multiplication operations for public-key cryptosystems require very large operands with 512 bits or more, and then existing multipliers are not available for such multiplications. In this paper, we will present a partition algorithm to divide large operands into small operands such as 32 bits or 64 bits, and then existing multipliers can be employed. We also present a parallel version of the partition algorithm by employing an important natural property of the multiplication operations in GF(2m) fields. 相似文献
35.
针对混沌映射在有限的精度平台下会退化为周期性行为的问题,提出一种新的图像加密算法。加密过程遵循经典的扩散和置乱结构,通过有限素域乘法群的性质对图像像素进行行和列的重新排列,为了减少相关性,行和列的排序以交错的方式多次重复。在扩散阶段,采用斜帐篷映射对像素进行异或运算,以此提高系统的安全性。结果分析表明,该算法具有极为敏感的秘钥,能够抵御各种攻击,性能优于几种先进的图像加密算法。 相似文献
36.
37.
38.
39.
The simulation of current impulse response using random response time model in avalanche photodiode (APD) is presented. A random response time model considers the randomness of times at which the primary and secondary carriers are generated in multiplication region. The dead-space effect is included in our model to demonstrate the impact on current impulse response of thin APDs. Current impulse response of homojunction InP p+-i-n+ diodes with the multiplication widths of 0.1 and 0.2 μm are calculated. Our results show that dead-space gives a slower decay rate of current impulse response in thin APD, which may degrade the bit-error-rate of the optical communication systems. 相似文献
40.
Elisavet Konstantinou Yannis C. Stamatiou Christos Zaroliagis 《International Journal of Information Security》2007,6(1):47-63
In many cryptographic applications it is necessary to generate elliptic curves (ECs) whose order possesses certain properties.
The method that is usually employed for the generation of such ECs is the so-called Complex Multiplication method. This method requires the use of the roots of certain class field polynomials defined on a specific parameter called
the discriminant. The most commonly used polynomials are the Hilbert and Weber ones. The former can be used to generate directly the EC, but they are characterized by high computational demands. The latter
have usually much lower computational requirements, but they do not directly construct the desired EC. This can be achieved
if transformations of their roots to the roots of the corresponding (generated by the same discriminant) Hilbert polynomials
are provided. In this paper we present a variant of the Complex Multiplication method that generates ECs of cryptographically
strong order. Our variant is based on the computation of Weber polynomials. We present in a simple and unifying manner a complete
set of transformations of the roots of a Weber polynomial to the roots of its corresponding Hilbert polynomial for all values
of the discriminant. In addition, we prove a theoretical estimate of the precision required for the computation of Weber polynomials
for all values of the discriminant. We present an extensive experimental assessment of the computational efficiency of the
Hilbert and Weber polynomials along with their precision requirements for various discriminant values and we compare them
with the theoretical estimates. We further investigate the time efficiency of the new Complex Multiplication variant under
different implementations of a crucial step of the variant. Our results can serve as useful guidelines to potential implementers
of EC cryptosystems involving generation of ECs of a desirable order on resource limited hardware devices or in systems operating
under strict timing response constraints.
This work was partially supported by the IST Programme of EC under contract no. IST-2001-33116 (FLAGS), and by the Action
IRAKLITOS (Fellowships for Research in the University of Patras) with matching funds from ESF (European Social Fund) and the
Greek Ministry of Education. 相似文献