全文获取类型
收费全文 | 858篇 |
免费 | 160篇 |
国内免费 | 16篇 |
专业分类
化学 | 3篇 |
综合类 | 8篇 |
数学 | 134篇 |
物理学 | 219篇 |
无线电 | 670篇 |
出版年
2024年 | 3篇 |
2023年 | 11篇 |
2022年 | 28篇 |
2021年 | 30篇 |
2020年 | 35篇 |
2019年 | 17篇 |
2018年 | 20篇 |
2017年 | 30篇 |
2016年 | 35篇 |
2015年 | 28篇 |
2014年 | 37篇 |
2013年 | 41篇 |
2012年 | 66篇 |
2011年 | 71篇 |
2010年 | 52篇 |
2009年 | 67篇 |
2008年 | 68篇 |
2007年 | 60篇 |
2006年 | 71篇 |
2005年 | 51篇 |
2004年 | 41篇 |
2003年 | 22篇 |
2002年 | 45篇 |
2001年 | 20篇 |
2000年 | 28篇 |
1999年 | 17篇 |
1998年 | 11篇 |
1997年 | 13篇 |
1996年 | 7篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1988年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有1034条查询结果,搜索用时 15 毫秒
991.
992.
Elliptic Curve Paillier Schemes 总被引:2,自引:0,他引:2
Steven D. Galbraith 《Journal of Cryptology》2002,15(2):129-138
This paper is concerned with generalisations of Paillier's probabilistic encryption scheme from the integers modulo a square
to elliptic curves over rings. Paillier himself described two public key encryption schemes based on anomalous elliptic curves
over rings. It is argued that these schemes are not secure. A more natural generalisation of Paillier's scheme to elliptic
curves is given.
Received January 2001 and revised June 2001 Online publication 23 November 2001 相似文献
993.
本文研究了有理数与有理区间的位置关系以及两个有理区间位置关系的安全多方计算.它们已广泛应用于数据库匹配、定位搜索等领域,是保密科学计算的一个重要分支.但目前已有文献在解决有理数与有理区间的位置关系时提出的协议效率较低,且两个有理区间位置关系问题的研究较为有限.针对这些问题,本文首先用多项式表示区间,将有理数与有理区间位置关系问题转化为整数向量的内积符号判定问题,设计了新的有理数与有理区间的保密计算协议.其次,以有理数与有理区间协议作为基础模块,设计了两个有理区间位置关系的保密计算协议.最后,理论分析及实验结果均表明本文方案是安全高效的,并给出了本文协议在有理数域上的百万富翁问题及计算几何问题的应用. 相似文献
994.
In this letter, we derive the maximal achievable secret key rates for continuous‐variable quantum key distribution (CVQKD) over free‐space optical (FSO) quantum channels. We provide a channel decomposition for FSO‐CVQKD quantum channels and study the SNR (signal‐to‐noise ratio) characteristics. The analytical derivations focus particularly on the low‐SNR scenarios. The results are convenient for wireless quantum key distribution and for the quantum Internet. 相似文献
995.
基于身份加密机制的光学加密密钥系统 总被引:1,自引:0,他引:1
从非对称的基于身份密钥体系出发,提出了一种适用于光学加密系统密钥管理的方法.首先简要介绍了基于身份密钥体系,特别是Boneh-Franklin算法,然后针对光学加密参数安全传输问题,给出了非对称密钥系统的密钥生成、分配、更新等算法,并从方法的复杂性、安全性等方面对算法进行了分析,最后对二维码加密问题进行了仿真,结果表明算法是正确有效和安全的 相似文献
996.
椭圆曲线密码(ECC,elliptic curve cryptograph)是密码学的重要分支之一,它可以用来加密数据,进行数字签名或者在安全通信的开始阶段进行密钥交换。在加密方面,基于ECC最有名的就是综合加密方案(ECIES,elliptic curve integrate encrypt scheme)。ECIES是Certi-com公司提出的公钥加密方案,可以抵挡选择明文攻击和选择密文攻击。ECIES各个步骤的实现可以用不同的算法,在软件中是可以配置的。而它实现的多样性也验证了它的灵活性以及可靠性。 相似文献
997.
With the rapid demand for various increasing applications, the internet users require a common secret key to communicate among a group. The traditional key exchange protocols involve a trusted key generation center for generation and distribution of the group key among the various group members. Therefore, the establishment of a trusted key generation center server and the generation (and distribution) of common session key require an extra overhead. To avoid this difficulty, a number of group key exchange protocols have been proposed in the literature. However, these protocols are vulnerable to many attacks and have a high computational and communication cost. In this paper, we present an elliptic curve cryptography–based authenticated group key exchange (ECC‐AGKE) protocol, which provides better security and has lower computational cost compared to related proposed schemes. Further, a complexity reduction method is deployed to reduce the overall complexity of the proposed elliptic curve cryptography–based authenticated group key exchange protocol. The security of proposed work is ensured by the properties of elliptic curves. A security adversarial model is given and an extensive formal security analysis against our claim is done in the random oracle model. We also made a comparison of our proposed protocol with similar works and found that ours have better complexity, security and efficiency over others. 相似文献
998.
In this paper, a general method of threshold Reversible Absolute moment block truncation coding Visual Cryptography Scheme (RAVCS) is introduced for sharing a binary secret image into multiple absolute moment block truncation coding (AMBTC) shadows. A RAVCS is firstly proposed to encode a secret by referencing one ABMTC image. Then, the proposed RAVCS is adopted to share the same secret into multiple groups of shadows by referencing multiple images. Those multiple groups of shadows are distributed to participants according to a matrix generated by the proposed shadow distribution algorithms. When any k or more participants share their shadows, the secret image is revealed by OR or XOR decryption. Further, those AMBTC shadows can be losslessly reverted to their original forms. Sufficient theoretical analysis and extensive experimental results are provided in this paper, showing the effectiveness and advantages of the proposed method. 相似文献
999.
1000.
In 2010,Liu,et al.proposed a certificateless signcryption scheme in the standard model,but many analyses revealed that Liu's scheme was insecure in fact.To overcome the disadvantages,the scheme was improved and a certificateless generalized signcryption scheme was constructed.In addition,a formal security model for the proposed scheme against the malicious-but-passive KGC attacks was introduced.Furthermore,the proposed scheme was proven to be secure under the decisional bilinear Diffie-Hellman and the computational Diffie-Hellman intractability assumptions in the standard model.Numerical results illustrate that the proposed algorithm is efficient. 相似文献