全文获取类型
收费全文 | 122篇 |
免费 | 25篇 |
国内免费 | 21篇 |
专业分类
综合类 | 19篇 |
无线电 | 56篇 |
一般工业技术 | 2篇 |
自动化技术 | 91篇 |
出版年
2024年 | 3篇 |
2023年 | 4篇 |
2022年 | 8篇 |
2021年 | 10篇 |
2020年 | 11篇 |
2019年 | 7篇 |
2018年 | 2篇 |
2017年 | 9篇 |
2016年 | 4篇 |
2015年 | 5篇 |
2014年 | 8篇 |
2013年 | 9篇 |
2012年 | 15篇 |
2011年 | 5篇 |
2010年 | 5篇 |
2009年 | 5篇 |
2008年 | 7篇 |
2007年 | 15篇 |
2006年 | 4篇 |
2005年 | 7篇 |
2004年 | 4篇 |
2003年 | 9篇 |
2002年 | 3篇 |
2000年 | 4篇 |
1999年 | 1篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 1篇 |
排序方式: 共有168条查询结果,搜索用时 0 毫秒
1.
IoT devices have been widely used with the advent of 5G. These devices contain a large amount of private data during transmission. It is primely important for ensuring their security. Therefore, we proposed a lightweight block cipher based on dynamic S-box named DBST. It is introduced for devices with limited hardware resources and high throughput requirements. DBST is a 128-bit block cipher supporting 64-bit key, which is based on a new generalized Feistel variant structure. It retains the consistency and significantly boosts the diffusion of the traditional Feistel structure. The SubColumns of round function is implemented by combining bit-slice technology with subkeys. The S-box is dynamically associated with the key. It has been demonstrated that DBST has a good avalanche effect, low hardware area, and high throughput. Our S-box has been proven to have fewer differential features than RECTANGLE S-box. The security analysis of DBST reveals that it can against impossible differential attack, differential attack, linear attack, and other types of attacks. 相似文献
2.
3.
Low differential uniformity functions provide good resistance to differential attacks. The AES (Advanced encryption standard) uses a differentially 4 uniform function (the inverse function) as its S-box. We give a further study of the inverse function in this paper. It is observed that after exchanging two values of a low differential uniformity function, its differential property still keeps good. Especially, for the inverse function over F2^n (n even), various possible differential uniformities are completely determined after its two values are exchanged. As a consequence, we get some highly nonlinear permutations with differential uniformity 4 which are not CCZ-equivalent (Carlet Charpin-Zinoviev equivalent) to the inverse function on F2^n. 相似文献
4.
Liguo Dong;Xinliang Ye;Libin Zhuang;Ruidian Zhan;M. Shamim Hossain; 《Expert Systems》2024,41(10):e13664
The threat of side-channel attacks poses a significant risk to the security of cryptographic algorithms. To counter this threat, we have designed an AES system capable of defending against such attacks, supporting AES-128, AES-192, and AES-256 encryption standards. In our system, the CPU oversees the AES hardware via the AHB bus and employs true random number generation to provide secure random inputs for computations. The hardware implementation of the AES S-box utilizes complex domain inversion techniques, while intermediate data is shielded using full-time masking. Furthermore, the system incorporates double-path error detection mechanisms to thwart fault propagation. Our results demonstrate that the system effectively conceals key power information, providing robust resistance against CPA attacks, and is capable of detecting injected faults, thereby mitigating fault-based attacks. 相似文献
5.
Zakaria Hassan Abdelwahab Talaat A. Elgarf Abdelhalim Zekry 《Information Security Journal: A Global Perspective》2020,29(6):341-365
ABSTRACT Confidentiality and integrity processes are based on SNOW and ZUC algorithms. These standardized algorithms are designed by the 3rd Generation Partnership Project (3GPP) for advanced mobile communication systems. Each algorithm has two S-boxes in its nonlinear layer structure. This paper proposes three different approaches to enhance the security level of both algorithms. The first approach aims to select the best combination of two S-boxes in the nonlinear part of each algorithm. Results showed that the best randomness properties are achieved by combining the Feistel structure (S1-box) and Rijndael (S2-box) in the SNOW algorithm and New Rijndael (S1-box) and Rijndael (S2-box) in the ZUC algorithm. The second approach aims to increase the nonlinearity and complexity of these algorithms by selecting a strong S-box to cascade the best-existing two S-boxes for both algorithms. The third approach is an extension of the former, based on a dynamic reform of such S-boxes as a function of the “Authentication Token” to increase the computational complexity of the upgraded two algorithms. These proposed upgrades are simulated by C language and tested successfully for their statistical properties using the standard NIST SP 800-22 test suite. 相似文献
6.
对低轮次 DES体制的忠实性进行了分析。DES体制的所有构成要素中 ,S-盒起着十分关键的作用 ,我们先分析了 S-盒的性质 ,并利用所得到的性质 ,对 DES的忠实性进行了研究。证明了结果 :对于 5 6比特的全密钥而言 ,第一轮 DES不是忠实的 ,第二轮和第三轮的 DES是忠实的。 相似文献
7.
在用户享有授权可自由添加记录的公共数据库中,数据良莠难分。为提高公共数据库的可信度,推广了敏感数据的完整性锁的概念,提出了一种对经由领域专家验证的可靠记录作标记的方法,且称所作标记为认证码。讨论了认证码的生成准则,并借助于MD5算法、DES密码算法中的S盒和RSA密码体制,设计了一个认证码的生成方案,最后还指出所生成的认证码能有效地抵抗伪造攻击和替伐攻击。 相似文献
8.
Stefan Tillich Martin Feldhofer Thomas Popp Johann Großschädl 《Journal of Signal Processing Systems》2008,50(2):251-261
Cryptographic substitution boxes (S-boxes) are an integral part of modern block ciphers like the Advanced Encryption Standard (AES). There exists a rich literature devoted to the efficient implementation of cryptographic S-boxes, wherein hardware designs for FPGAs and standard cells received particular attention. In this paper we present a comprehensive study of different standard-cell implementations of the AES S-box with respect to timing (i.e. critical path), silicon area, power consumption, and combinations of these cost metrics. We examine implementations which exploit the mathematical properties of the AES S-box, constructions based on hardware look-up tables, and dedicated low-power solutions. Our results show that the timing, area, and power properties of the different S-box realizations can vary by up to almost an order of magnitude. In terms of area and area-delay product, the best choice are implementations which calculate the S-box output. On the other hand, the hardware look-up solutions are characterized by the shortest critical path. The dedicated low-power implementations do not only reduce power consumption by a large degree, but they also show good timing properties and offer the best power-delay and power-area product, respectively. 相似文献
9.
基于S盒优化的轻量级加密算法设计 总被引:1,自引:0,他引:1
分组密码一直是解决信息系统安全问题的常用加密方法。分组密码的典型代表数据加密标准DES(Data Encryption Standard)被广泛应用于软件加密和硬件加密,其中所体现的设计思想和设计原则依然值得研究和借鉴。S盒作为DES算法的一个关键环节,它的设计好坏直接影响DES的加密性能。通过对分组密码安全性设计的分析,立足于DES算法框架,提出了一种轻量级安全加密算法LEA(Light weight Encryption Algorithm),通过增加位选逻辑陷阱来对S盒中的元素进行选取和重新优化设计,最后从S盒统计特性角度对其安全性进行分析。该算法能有效解决低成本系统的安全问题。 相似文献
10.
彭佛才 《微电子学与计算机》2003,20(6):44-45,50
分组密码算法是信息安全领域中最为重要的加解密技术之一。与传统的分组密码不同,该算法具有可变的S盒和变化的循环加密结构,从而大大提高了抗差分攻击和线性攻击的能力。结合某媒体网关的设计项目,研究了该算法并详细探导了其设计方法。员后,测试了算法的实际性能。 相似文献