CRYPTOGRAPHIC

作品数:99被引量:108H指数:6
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:崔国华郑明辉王滨李峥马智更多>>
相关机构:解放军信息工程大学华中科技大学中国人民解放军信息工程大学淮北矿业集团更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家高技术研究发展计划中国博士后科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Consensus⁃Based Cryptographic Framework for Side⁃Channel Attack Resilience in Cloud Environments
《Journal of Harbin Institute of Technology(New Series)》2025年第2期90-104,共15页I.Nasurulla K.Hemalatha P.Ramachandran S.Parvathi 
Cloud environments are essential for modern computing,but are increasingly vulnerable to Side⁃Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we...
关键词:Cloud computing side channel attacks HAVAL cryptographic hash Wilcoxon signed⁃rank test consensus mechanism improved schmidt⁃samoa cryptography 
RCCA-SM9:securing SM9 on corrupted machines
《Science China(Information Sciences)》2024年第11期102-116,共15页Rongmao CHEN Jinrong CHEN Xinyi HUANG Yi WANG 
supported by National Natural Science Foundation of China(Grant Nos.62122092,62032005)。
The SM9 identity-based encryption(IBE)scheme is a cryptographic standard used in China,and has been incorporated into the ISO/IEC standard in 2021.This work primarily proposes a countermeasure to secure the SM9 IBE sc...
关键词:SM9 subversion resilience subversion attack cryptographic reverse firewall RCCA 
Dynamics analysis and cryptographic implementation of a fractional-order memristive cellular neural network model
《Chinese Physics B》2024年第4期418-433,共16页周新卫 蒋东华 Jean De Dieu Nkapkop Musheer Ahmad Jules Tagne Fossi Nestor Tsafack 吴建华 
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...
关键词:cellular neural network MEMRISTOR hardware circuit compressive sensing privacy data protection 
Data Secure Storage Mechanism for IIoT Based on Blockchain被引量:2
《Computers, Materials & Continua》2024年第3期4029-4048,共20页Jin Wang Guoshu Huang R.Simon Sherratt Ding Huang Jia Ni 
supported by China’s National Natural Science Foundation(Nos.62072249,62072056);This work is also funded by the National Science Foundation of Hunan Province(2020JJ2029).
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi...
关键词:Blockchain IIoT data storage cryptographic commitment 
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
《Computers, Materials & Continua》2024年第3期4417-4452,共36页Fauziyah Zhaoshun Wang Mujahid Tabassum 
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method...
关键词:CRYPTOGRAPHIC SECURITY privacy preservation DECRYPTION INTEGRITY 
Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing
《Computers, Materials & Continua》2024年第2期2023-2045,共23页Nader Abdel Karim Osama A.Khashan Waleed K.Abdulraheem Moutaz Alazab Hasan Kanaker Mahmoud E.Farfoura Mohammad Alshinwan 
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i...
关键词:Cloud computing performance VIRTUALIZATION hypervisors HYPER-V KVM cryptographic algorithm 
Joint Authentication Public Network Cryptographic Key Distribution Protocol Based on Single Exposure Compressive Ghost Imaging
《Chinese Physics Letters》2024年第2期47-56,共10页俞文凯 王硕飞 商克谦 
supported by the Beijing Natural Science Foundation(Grant No.4222016).
In the existing ghost-imaging-based cryptographic key distribution(GCKD)protocols,the cryptographic keys need to be encoded by using many modulated patterns,which undoubtedly incurs long measurement time and huge memo...
关键词:GHOST GHOST AUTHENTICATION 
A Flexible Architecture for Cryptographic Applications: ECC and PRESENT
《Computers, Materials & Continua》2023年第7期1009-1025,共17页Muhammad Rashid Omar S.Sonbul Muhammad Arif Furqan Aziz Qureshi Saud.S.Alotaibi Mohammad H.Sinky 
The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4320020DSR01).
This work presents a flexible/unified hardware architecture of Elliptic-curve Cryptography(ECC)and PRESENT for cryptographic applications.The features of the proposed work are(i)computation of only the point multiplic...
关键词:Flexible UNIFIED design ECC PRESENT FPGA 
Classification Model for IDS Using Auto Cryptographic Denoising Technique
《Computer Systems Science & Engineering》2023年第4期671-685,共15页N.Karthikeyan P.Sivaprakash S.Karthik 
Intrusion detection systems(IDS)are one of the most promising ways for securing data and networks;In recent decades,IDS has used a variety of categorization algorithms.These classifiers,on the other hand,do not work e...
关键词:Auto cryptographic denoising(ACD) classifier intrusion detection system(IDS) OPTIMIZER performance measures 
WBZUC:novel white-box ZUC-128 stream cipher被引量:1
《The Journal of China Universities of Posts and Telecommunications》2023年第2期96-106,共11页Yang Yatao Zhang Ruoqing Dong hui Ma Yingjie Zhang Xiaowei 
supported by the Beijing Natural Science Foundation(4232034);the Fundamental Research Funds for the Central Universities(328202222);the“Communication Engineering”and“Electronic Information Engineering”National First-Class Undergraduate Major Construction Project。
White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in ...
关键词:Zu Chongzhi-128(ZUC-128)algorithm white-box cryptography cryptographic implementation lookup table secure communication 
检索报告 对象比较 聚类工具 使用帮助 返回顶部