全文获取类型
收费全文 | 3123篇 |
免费 | 297篇 |
国内免费 | 176篇 |
专业分类
电工技术 | 32篇 |
综合类 | 238篇 |
化学工业 | 453篇 |
金属工艺 | 33篇 |
机械仪表 | 78篇 |
建筑科学 | 140篇 |
矿业工程 | 114篇 |
能源动力 | 73篇 |
轻工业 | 11篇 |
水利工程 | 16篇 |
石油天然气 | 341篇 |
武器工业 | 2篇 |
无线电 | 652篇 |
一般工业技术 | 246篇 |
冶金工业 | 14篇 |
原子能技术 | 10篇 |
自动化技术 | 1143篇 |
出版年
2024年 | 7篇 |
2023年 | 21篇 |
2022年 | 47篇 |
2021年 | 75篇 |
2020年 | 73篇 |
2019年 | 49篇 |
2018年 | 65篇 |
2017年 | 77篇 |
2016年 | 103篇 |
2015年 | 89篇 |
2014年 | 172篇 |
2013年 | 230篇 |
2012年 | 198篇 |
2011年 | 227篇 |
2010年 | 214篇 |
2009年 | 210篇 |
2008年 | 196篇 |
2007年 | 255篇 |
2006年 | 234篇 |
2005年 | 203篇 |
2004年 | 148篇 |
2003年 | 122篇 |
2002年 | 109篇 |
2001年 | 66篇 |
2000年 | 63篇 |
1999年 | 49篇 |
1998年 | 47篇 |
1997年 | 41篇 |
1996年 | 46篇 |
1995年 | 33篇 |
1994年 | 24篇 |
1993年 | 18篇 |
1992年 | 20篇 |
1991年 | 10篇 |
1990年 | 12篇 |
1989年 | 8篇 |
1988年 | 9篇 |
1987年 | 1篇 |
1986年 | 3篇 |
1984年 | 1篇 |
1983年 | 5篇 |
1982年 | 7篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1976年 | 1篇 |
1975年 | 3篇 |
1974年 | 1篇 |
1970年 | 1篇 |
1954年 | 1篇 |
排序方式: 共有3596条查询结果,搜索用时 343 毫秒
1.
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time. 相似文献
2.
Stream ciphers based on linear feedback shift register (LFSR) are suitable for constrained environments, such as satellite communications, radio frequency identification devices tag, sensor networks and Internet of Things, due to its simple hardware structures, high speed encryption and lower power consumption. LFSR, as a cryptographic primitive, has been used to generate a maximum period sequence. Because the switching of the status bits is regular, the power consumption of the LFSR is correlated in a linear way. As a result, the power consumption characteristics of stream cipher based on LFSR are vulnerable to leaking initialization vectors under the power attacks. In this paper, a new design of LFSR against power attacks is proposed. The power consumption characteristics of LFSR can be masked by using an additional LFSR and confused by adding a new filter Boolean function and a flip-flop. The design method has been implemented easily by circuits in this new design in comparison with the others. 相似文献
3.
Bahram Rashidi 《International Journal of Circuit Theory and Applications》2020,48(8):1227-1243
In this paper, low-cost and two-cycle hardware structures of the PRINCE lightweight block cipher are presented. In the first structure, we proposed an area-constrained structure, and in the second structure, a high-speed implementation of the PRINCE cipher is presented. The substitution box (S-box) and the inverse of S-box (S-box−1) blocks are the most complex blocks in the PRINCE cipher. These blocks are designed by an efficient structure with low critical path delay. In the low-cost structure, the S-boxes and S-boxes−1 are shared between the round computations and the intermediate step of PRINCE cipher. Therefore, the proposed architecture is implemented based on the lowest number of computation resources. The two-cycle implementation of PRINCE cipher is designed by a processing element (PE), which is a general and reconfigurable element. This structure has a regular form with the minimum number of the control signal. Implementation results of the proposed structures in 180-nm CMOS technology and Virtex-4 and Virtex-6 FPGA families are achieved. The proposed structures, based on the results, have better critical path delay and throughput compared with other's related works. 相似文献
4.
地质特征认识对煤层气开发效果起着重要作用。在资源特征相差不大的情况下,发现煤层气相邻井的产量差异仍较大。排除工程因素后,通过选取8类地质参数,细致比对了保德区块低产井与邻井的参数特征,筛查出其关键因素为煤层微幅构造与顶板封盖条件,其中以微幅构造为主。据此,重新认识并划分出区块新的次生褶皱背斜单元、向斜单元和斜坡单元,获得了不同次生褶皱构造单元的开发特征。结果表明,高、低产井分布与次生褶皱背斜、向斜相关性高达92%。其中:高产井主要分布在次生褶皱背斜变化较缓、呈隆起状的“平台”,且煤层顶板以泥岩、碳质泥岩为主,封盖性较好;低产井主要分布在次生褶皱向斜,同一井台各井开发效果差异表现为从向斜条带轴部—向斜条带内—向斜条带外的煤层气井平均单井产量不断增加,到向斜轴部的距离大于向斜曲率半径73.5%的范围为主力产气区,小于向斜曲率半径40.0%范围为产水主力区。这对煤层气新井部署、生产管理、开发调整等,具有一定的指导意义。 相似文献
5.
This work considers the problem of increasing the performance of the ciphers based on Data-Dependent (DD) operations (DDO)
for VLSI implementations. New minimum size primitives are proposed to design DDOs. Using advanced DDOs instead of DD permutations
(DDP) in the DDP-based iterative ciphers Cobra-H64 and Cobra-H128 the number of rounds has been significantly reduced yielding
enhancement of the “performance per cost” value and retaining security at the level of indistinguishability from a random
transformation. To obtain further enhancement of this parameter a new crypto-scheme based on the advanced DDOs is proposed.
The FPGA implementation of the proposed crypto-scheme achieves higher throughput value and minimizes the allocated resources
than the conventional designs. Design of the DDO boxes of different orders is considered and their ASIC implementation is
estimated. 相似文献
6.
7.
8.
低渗透油田合理注采井距的确定--以纯41块沙4段低渗透油田为例 总被引:3,自引:1,他引:2
以纯41块沙4段低渗透油田为例,从低渗透油田渗流机理出发,分析了造成低渗透油田开发效果差的主要原因。在计算注水井最大井底流压、油井最小井底流压、油水井之间可建立的最大注采压差的基础上,结合室内试验确定的最小启动压力梯度公式计算油田技术极限注采井距,并结合经济合理井距计算结果,确定了油田合理注采井距,并提出了下二步调整方案,实施后取得了显著的效果。该方法为低渗透油田合理井距的确定、提高低渗透油田的开发效果提供了理论依据。 相似文献
9.
10.
本文分析了造成ora-01555错误的原因,并提出解决办法。ora-01555错误一直是DBA与developer争论的焦点,解决其问题应是双方协调的结果。 相似文献