全文获取类型
收费全文 | 108篇 |
免费 | 21篇 |
国内免费 | 24篇 |
专业分类
综合类 | 18篇 |
无线电 | 49篇 |
一般工业技术 | 2篇 |
自动化技术 | 84篇 |
出版年
2023年 | 3篇 |
2022年 | 6篇 |
2021年 | 8篇 |
2020年 | 7篇 |
2019年 | 7篇 |
2018年 | 1篇 |
2017年 | 8篇 |
2016年 | 3篇 |
2015年 | 5篇 |
2014年 | 8篇 |
2013年 | 9篇 |
2012年 | 15篇 |
2011年 | 5篇 |
2010年 | 5篇 |
2009年 | 5篇 |
2008年 | 7篇 |
2007年 | 15篇 |
2006年 | 4篇 |
2005年 | 7篇 |
2004年 | 4篇 |
2003年 | 9篇 |
2002年 | 3篇 |
2000年 | 4篇 |
1999年 | 1篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 1篇 |
排序方式: 共有153条查询结果,搜索用时 15 毫秒
131.
AES是现有的一种抗攻击能力强、加密速度快以及可移植性好的加密算法。在FPGA上实现AES算法可以更快地处理数据。为了提高整体系统的运行速度,在优化设计中采用全流水的技术来实现算法,并对S-box进行优化。S-box是AES算法中唯一的非线性单元,在进行加密、解密尤其是在字节替换过程时,需要分别执行S-box和逆S-box,一般使用查表来进行操作,这样会占用大量的资源,所以对S-box进行优化是对整个算法优化的最重要的步骤。最终使用Modelsim对设计结果进行仿真然后使用Quartus进行总体综合。 相似文献
132.
The Data Encryption Standard (DES) is a cryptographic algorithm, designed by IBM, that was selected to be the national standard in 1977 by the National Bureau of Standards. The algorithm itself was entirely published, but the design criteria were kept secret until 1994 when Coppersmith, one of the designers of DES, published them. He stated that the IBM team already knew about the attack called differential cryptanalysis during the design of the algorithm and that it had an effect on choosing the S-boxes. To be more specific, he mentioned eight design criteria that all the S-boxes of DES are based on. How the S-boxes were generated is a mystery, as the legend says this was outsourced to the NSA. Indeed, building a set of S-boxes respecting these criteria is not a trivial task.
In this article, the authors present an efficient S-box generator respecting all criteria and more. Coppersmith’s design criteria served as a basis, but were strengthened for better resistance to linear cryptanalysis. While other researchers have already proposed S-box generators for DES satisfying either non-linearity or good diffusion, our generator offers both. Moreover, apart from suggesting a new set of eight S-boxes, it can also very quickly produce a large pool of S-boxes to be used in further research. 相似文献
133.
一种新的加密标准 AES 总被引:6,自引:0,他引:6
AES是一种新的加密标准,它是分组加密算法,分组长度为128位,密钥长度为128bits、192bits、256bits三种,分别称为AES-128、AES-192、AES-256。本文介绍了AES的加密算法的加密过程,函数定义,密钥扩展过程。 相似文献
134.
本文利用Li-York混沌判别定理,构造了一类分段线性连续混沌映射.基于此类映射,建立了一个构造一类分段非线性鲁棒混沌映射的判别定理.作为应用,构造了一个由多项式函数和三角函数映射合成的分段非线性鲁棒混沌映射.通过计算该混沌映射的分岔图,验证了映射在参数范围内的混沌性.作为鲁棒混沌的应用,设计了三个基于分段非线性鲁棒混沌映射的伪随机数发生器.在此基础上,利用混沌映射对初始参数的敏感性,提出了批量生成S盒的算法.S盒密码性能的分析结果表明,生成的S盒具有良好的密码学性能,可以较好的抵抗线性与差分攻击,为密码算法的研究发展提供基础与条件. 相似文献
135.
David Wilson 《Cryptologia》2013,37(2):120-121
The eminent British mathematician J. E. Littlewood once invented a cipher that he claimed was unbreakable. Here I dispute this claim. 相似文献
136.
137.
Dawood Shah Tariq Shah Sajjad Shaukat Jamal Mohammad Mazyad Hazzazi Amer Aljaedi Adel R. Alharbi 《计算机、材料和连续体(英文)》2023,75(3):5073-5086
Data Encryption Standard (DES) is a symmetric key cryptosystem that is applied in different cryptosystems of recent times. However, researchers found defects in the main assembling of the DES and declared it insecure against linear and differential cryptanalysis. In this paper, we have studied the faults and made improvements in their internal structure and get the new algorithm for Improved DES. The improvement is being made in the substitution step, which is the only nonlinear component of the algorithm. This alteration provided us with great outcomes and increase the strength of DES. Accordingly, a novel good quality S-box construction scheme has been hired in the substitution phase of the DES. The construction involves the Galois field method and generates robust S-boxes that are used to secure the scheme against linear and differential attacks. Then again, the key space of the improved DES has been enhanced against the brute force attack. The outcomes of different performance analyses depict the strength of our proposed substitution boxes which also guarantees the strength of the overall DES. 相似文献
138.
为研究分组密码CLEFIA-128抵抗不可能差分攻击的能力,基于一条9轮不可能差分路径,分析了13轮不带白化密钥的CLEFIA-128算法。利用轮函数中S盒差分分布表恢复部分密钥,利用轮密钥之间的关系减少密钥猜测量,并使用部分密钥分别猜测(Early Abort)技术有效地降低了复杂度。计算结果表明,该方法的数据复杂度和时间复杂度分别为O(2103.2)和O(2124.1)。 相似文献
139.
140.