首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   457篇
  免费   68篇
  国内免费   1篇
化学   10篇
力学   14篇
综合类   10篇
数学   50篇
物理学   25篇
无线电   417篇
  2024年   1篇
  2023年   2篇
  2022年   8篇
  2021年   7篇
  2020年   10篇
  2019年   10篇
  2018年   9篇
  2017年   15篇
  2016年   20篇
  2015年   14篇
  2014年   29篇
  2013年   18篇
  2012年   38篇
  2011年   22篇
  2010年   24篇
  2009年   30篇
  2008年   22篇
  2007年   34篇
  2006年   30篇
  2005年   22篇
  2004年   22篇
  2003年   26篇
  2002年   16篇
  2001年   11篇
  2000年   13篇
  1999年   3篇
  1998年   13篇
  1997年   12篇
  1996年   7篇
  1995年   6篇
  1994年   7篇
  1993年   3篇
  1992年   5篇
  1991年   1篇
  1990年   3篇
  1989年   3篇
  1988年   3篇
  1987年   3篇
  1986年   1篇
  1984年   1篇
  1983年   1篇
  1981年   1篇
排序方式: 共有526条查询结果,搜索用时 437 毫秒
1.
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time.  相似文献   
2.
In this paper, for the the primes p such that 3 is a divisor of p − 1, we prove a result which reduces the computation of the linear complexity of a sequence over GF(p m) (any positive integer m) with the period 3n (n and p m − 1 are coprime) to the computation of the linear complexities of three sequences with the period n. Combined with some known algorithms such as generalized Games-Chan algorithm, Berlekamp-Massey algorithm and Xiao-Wei-Lam-Imamura algorithm, we can determine the linear complexity of any sequence over GF(p m) with the period 3n (n and p m − 1 are coprime) more efficiently.  相似文献   
3.
Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overhead (either area or performance). In this paper we investigate two systematic approaches to low-cost, low-latency CED for symmetric encryption algorithm RC6. The proposed techniques have been validated on FPGA implementations of RC6, one of the advanced encryption standard finalists.  相似文献   
4.
由于密码分析研究的进展及DES自身的弱点,原64比特的DES将不能作为数据加密的标准算法而长期存在。在原来工作的基础上,本文提出了256比特的分组密码方案。密码算法由基于混沌映射的数字滤波器构造。  相似文献   
5.
For pseudo-random generators where one or several LFSRs are combined by a memoryless function, it is known that the output sequences are correlated to certain LFSR-sequences whose correlation coefficients c t satisfy the equation i c 2 i = 1. In this paper it is proved that a corresponding result also holds for generators whose LFSRs are connected to a combiner with memory.If correlation probabilities are conditioned on side information, e.g., on known output digits, it is shown that new or stronger correlations may occur. This is exemplified for the summation cipher with only two LFSRs where such correlations can be exploited in a known plaintext attack. A cryptanalytic algorithm is given which is shown to be successful for LFSRs of considerable length and with arbitrary feedback connection.A preliminary version of this paper was presented at Eurocrypt '90, May 21–24, Århus, Denmark, and has appeared in the proceedings, pp. 204–213.  相似文献   
6.
7.
A chaotic-cipher-based packet body encryption algorithm for JPEG2000 images is proposed in this paper. In order to produce a compliant codestream, a 2-byte block encryption procedure including bit-wise exclusive OR and cyclic rotation operations is investigated. Moreover, a repeatedly encryption process is adopted to eliminate the undesirable marker codes during encryption. The repeatedly encryption process only introduces a negligible computational overhead. Both simulations and analysis show that the proposed algorithm is of high security and simplicity. Therefore, these good properties make the algorithm efficient to process and useful for image applications.  相似文献   
8.
Nonlinear filter generators are commonly used as keystream generators in stream ciphers. A nonlinear filter generator utilizes a nonlinear filtering function to combine the outputs of a linear feedback shift register (LFSR) to improve the linear complexity of keystream sequences. However, the LFSR-based stream ciphers are still potentially vulnerable to algebraic attacks that recover the key from some keystream bits. Although the known algebraic attacks only require polynomial time complexity of computations, all have their own constraints. This paper uses the linearization of nonlinear filter generators to cryptanalyze LFSR-based stream ciphers. Such a method works for any nonlinear filter generators. Viewing a nonlinear filter generator as a Boolean network that evolves as an automaton through Boolean functions, we first give its linearization representation. Compared to the linearization representation in Limniotis et al. (2008), this representation requires lower spatial complexity of computations in most cases. Based on the representation, the key recoverability is analyzed via the observability of Boolean networks. An algorithm for key recovery is given as well. Compared to the exhaustive search to recover the key, using this linearization representation requires lower time complexity of computations, though it leads to exponential time complexity.  相似文献   
9.
杜琨  于鸿洋 《电视技术》2015,39(15):110-114
随着智能移动设备的广泛普及,家庭用户逐渐渴望能够在智能终端上收看数字电视节目。由于传统家庭内部的机顶盒只能提供有线数字电视信号,因此本文研究了一种基于UDP协议的室内无线接收DVB-C信号的方法,并分析了MPEG-2 TS的相关原理及室内无线传输损耗,在此基础上讨论了方案的可行性。  相似文献   
10.
鄢斌  李军 《通信技术》2015,48(10):1168-1173
模2n+1乘法(n=8、16)在分组密码算法中比较常见,如IDEA算法,但由于其实现逻辑复杂,往往被视为密码算法性能的瓶颈。提出了一种适用于分组密码算法运算特点的基于Radix-4 Booth编码的模2n+1乘法器实现方法,其输入/输出均无需额外的转换电路,并通过简化部分积生成、采用重新定义的3-2和4-2压缩器等措施以减少路径时延和硬件复杂度。比较其他同类设计,该方法具有较小的面积、时延,可有效提高分组密码算法的加解密性能。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号