全文获取类型
收费全文 | 108篇 |
免费 | 21篇 |
国内免费 | 24篇 |
专业分类
综合类 | 18篇 |
无线电 | 49篇 |
一般工业技术 | 2篇 |
自动化技术 | 84篇 |
出版年
2023年 | 3篇 |
2022年 | 6篇 |
2021年 | 8篇 |
2020年 | 7篇 |
2019年 | 7篇 |
2018年 | 1篇 |
2017年 | 8篇 |
2016年 | 3篇 |
2015年 | 5篇 |
2014年 | 8篇 |
2013年 | 9篇 |
2012年 | 15篇 |
2011年 | 5篇 |
2010年 | 5篇 |
2009年 | 5篇 |
2008年 | 7篇 |
2007年 | 15篇 |
2006年 | 4篇 |
2005年 | 7篇 |
2004年 | 4篇 |
2003年 | 9篇 |
2002年 | 3篇 |
2000年 | 4篇 |
1999年 | 1篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 1篇 |
排序方式: 共有153条查询结果,搜索用时 156 毫秒
11.
12.
13.
基于S盒优化的轻量级加密算法设计 总被引:1,自引:0,他引:1
分组密码一直是解决信息系统安全问题的常用加密方法。分组密码的典型代表数据加密标准DES(Data Encryption Standard)被广泛应用于软件加密和硬件加密,其中所体现的设计思想和设计原则依然值得研究和借鉴。S盒作为DES算法的一个关键环节,它的设计好坏直接影响DES的加密性能。通过对分组密码安全性设计的分析,立足于DES算法框架,提出了一种轻量级安全加密算法LEA(Light weight Encryption Algorithm),通过增加位选逻辑陷阱来对S盒中的元素进行选取和重新优化设计,最后从S盒统计特性角度对其安全性进行分析。该算法能有效解决低成本系统的安全问题。 相似文献
14.
彭佛才 《微电子学与计算机》2003,20(6):44-45,50
分组密码算法是信息安全领域中最为重要的加解密技术之一。与传统的分组密码不同,该算法具有可变的S盒和变化的循环加密结构,从而大大提高了抗差分攻击和线性攻击的能力。结合某媒体网关的设计项目,研究了该算法并详细探导了其设计方法。员后,测试了算法的实际性能。 相似文献
15.
DES(数据加密标准)算法被广泛应用于软件加密和硬件加密。S盒是DES算法中的一个关键环节,它的设计好坏直接影响DES的加密性能。VHDL(甚高速集成电路硬件描述语言)是借助EDA(电子设计自动化)工具进行硬件设计的基本描述语言。文中结合VHDL的特点,对使用VHDL设计S盒进行了一些分析,综合速度、资源利用率等提出了最优方案。 相似文献
16.
Stefan Tillich Martin Feldhofer Thomas Popp Johann Großschädl 《Journal of Signal Processing Systems》2008,50(2):251-261
Cryptographic substitution boxes (S-boxes) are an integral part of modern block ciphers like the Advanced Encryption Standard (AES). There exists a rich literature devoted to the efficient implementation of cryptographic S-boxes, wherein hardware designs for FPGAs and standard cells received particular attention. In this paper we present a comprehensive study of different standard-cell implementations of the AES S-box with respect to timing (i.e. critical path), silicon area, power consumption, and combinations of these cost metrics. We examine implementations which exploit the mathematical properties of the AES S-box, constructions based on hardware look-up tables, and dedicated low-power solutions. Our results show that the timing, area, and power properties of the different S-box realizations can vary by up to almost an order of magnitude. In terms of area and area-delay product, the best choice are implementations which calculate the S-box output. On the other hand, the hardware look-up solutions are characterized by the shortest critical path. The dedicated low-power implementations do not only reduce power consumption by a large degree, but they also show good timing properties and offer the best power-delay and power-area product, respectively. 相似文献
17.
18.
Zakaria Hassan Abdelwahab Talaat A. Elgarf Abdelhalim Zekry 《Information Security Journal: A Global Perspective》2020,29(6):341-365
ABSTRACT Confidentiality and integrity processes are based on SNOW and ZUC algorithms. These standardized algorithms are designed by the 3rd Generation Partnership Project (3GPP) for advanced mobile communication systems. Each algorithm has two S-boxes in its nonlinear layer structure. This paper proposes three different approaches to enhance the security level of both algorithms. The first approach aims to select the best combination of two S-boxes in the nonlinear part of each algorithm. Results showed that the best randomness properties are achieved by combining the Feistel structure (S1-box) and Rijndael (S2-box) in the SNOW algorithm and New Rijndael (S1-box) and Rijndael (S2-box) in the ZUC algorithm. The second approach aims to increase the nonlinearity and complexity of these algorithms by selecting a strong S-box to cascade the best-existing two S-boxes for both algorithms. The third approach is an extension of the former, based on a dynamic reform of such S-boxes as a function of the “Authentication Token” to increase the computational complexity of the upgraded two algorithms. These proposed upgrades are simulated by C language and tested successfully for their statistical properties using the standard NIST SP 800-22 test suite. 相似文献
19.
Recently many substitution box based encryption algorithms ensuring privacy have been proposed. Many, chaotic map based S-boxes have been generated posing high nonlinearity and strong cryptographic properties. Encryption schemes depending on the substitution box (S-box) only are weak and easily breakable with the help of chosen plaintext and ciphertext attacks. In this work, we have completely cryptanalyzed S-box based encryption scheme successfully by two types of attacks. Cryptanalysis in both types of attacks is performed by only one selected image. Moreover, we have suggested some improvements in the algorithm to defeat attacks. 相似文献
20.