首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1126篇
  免费   207篇
  国内免费   119篇
电工技术   29篇
综合类   153篇
化学工业   5篇
金属工艺   24篇
机械仪表   81篇
建筑科学   15篇
矿业工程   16篇
能源动力   5篇
水利工程   4篇
石油天然气   2篇
武器工业   1篇
无线电   351篇
一般工业技术   30篇
冶金工业   2篇
原子能技术   1篇
自动化技术   733篇
  2024年   1篇
  2023年   15篇
  2022年   16篇
  2021年   31篇
  2020年   29篇
  2019年   22篇
  2018年   28篇
  2017年   43篇
  2016年   35篇
  2015年   43篇
  2014年   69篇
  2013年   112篇
  2012年   97篇
  2011年   76篇
  2010年   72篇
  2009年   77篇
  2008年   83篇
  2007年   99篇
  2006年   87篇
  2005年   64篇
  2004年   52篇
  2003年   74篇
  2002年   52篇
  2001年   38篇
  2000年   45篇
  1999年   19篇
  1998年   10篇
  1997年   16篇
  1996年   9篇
  1995年   11篇
  1994年   7篇
  1993年   5篇
  1992年   5篇
  1990年   6篇
  1989年   2篇
  1988年   1篇
  1982年   1篇
排序方式: 共有1452条查询结果,搜索用时 15 毫秒
1.
Stream ciphers based on linear feedback shift register (LFSR) are suitable for constrained environments, such as satellite communications, radio frequency identification devices tag, sensor networks and Internet of Things, due to its simple hardware structures, high speed encryption and lower power consumption. LFSR, as a cryptographic primitive, has been used to generate a maximum period sequence. Because the switching of the status bits is regular, the power consumption of the LFSR is correlated in a linear way. As a result, the power consumption characteristics of stream cipher based on LFSR are vulnerable to leaking initialization vectors under the power attacks. In this paper, a new design of LFSR against power attacks is proposed. The power consumption characteristics of LFSR can be masked by using an additional LFSR and confused by adding a new filter Boolean function and a flip-flop. The design method has been implemented easily by circuits in this new design in comparison with the others.  相似文献   
2.
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time.  相似文献   
3.
In this paper, low-cost and two-cycle hardware structures of the PRINCE lightweight block cipher are presented. In the first structure, we proposed an area-constrained structure, and in the second structure, a high-speed implementation of the PRINCE cipher is presented. The substitution box (S-box) and the inverse of S-box (S-box−1) blocks are the most complex blocks in the PRINCE cipher. These blocks are designed by an efficient structure with low critical path delay. In the low-cost structure, the S-boxes and S-boxes−1 are shared between the round computations and the intermediate step of PRINCE cipher. Therefore, the proposed architecture is implemented based on the lowest number of computation resources. The two-cycle implementation of PRINCE cipher is designed by a processing element (PE), which is a general and reconfigurable element. This structure has a regular form with the minimum number of the control signal. Implementation results of the proposed structures in 180-nm CMOS technology and Virtex-4 and Virtex-6 FPGA families are achieved. The proposed structures, based on the results, have better critical path delay and throughput compared with other's related works.  相似文献   
4.
Edon80 is a stream cipher design that had advanced to the third and last phase of the eSTREAM project. The core of the cipher consists quasigroup string e-transformations and it employs four quasigroups of order 4. The employed quasigroups have influence on the period of the keystream. There are 576 quasigroups of order 4 in total which have different period factors. The four quasigroups used in Edon80 were chosen by numerous computer experiments. In this paper, based on permutation groups, we give a theory criterion for the determination of quasigroups and give a complete classification for the 576 quasigroups of order 4 according to their period factors.  相似文献   
5.
分析了国内外物联网安全政策、技术、标准、产业等形势,重点强调了当前我国物联网发展中存在的安全风险,包括大连接环境下的设备风险、物联网网络本身安全风险以及物联网上承载的各类应用安全风险,提出了打造以密码为核心的物联网安全体系,加速新技术在物联网安全的应用,以新基建为契机建立物联网领域安全设备泛在化部署新体系,以多层次立体式理念确保物联网安全,呼吁供给侧需求侧建立安全协同新机制,共同促进物联网产业安全可持续发展。  相似文献   
6.
7.
谢泳 《煤矿机械》2003,(9):56-57
介绍了用ObjectARX对AutoCAD进行三维开发的方法,利用圆锥面近似替代螺旋面的画法,较好地形成了螺纹的结构,并编程实现了螺纹实体的参数化绘图。这种方法对绘制其他牙型的螺纹实体结构,具有指导意义。  相似文献   
8.
基于Auto CAD的矿山三维实体井巷实现研究   总被引:2,自引:0,他引:2  
研究了数字矿山建设过程中巷道及井下相关构筑物的三维实体形成的关键问题,分析了数字矿山建设中三维井巷设计的重要意义,在此基础上,基于Auto CAD平台,利用VC6.0和Object ARX技术设计开发了采矿设计系统。该系统可以实现三维实体井巷,能很好地解决井巷的三维实体化,并能使其实现过程自动化,取得令人满意的结果。另外,矿山设计中压气管道、通风系统及给排水系统等都可以用此系统来生成。  相似文献   
9.
有限元前后处理系统的开发对工程设计和分析具有重要的意义。本文采用先进的ObjectARX技术,结合大跨度桥梁抗震设计的需要开发了适合大跨度桥梁抗震设计建模和数据处理的有限元前后处理系统。  相似文献   
10.
The frequencies of n-graphs, groups of n letters, for n as large as 6 are compiled and used to launch a statistical attack on a running key cipher. Programs written in C++ make the calculations possible. The results of the attack for various values of n are analyzed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号