全文获取类型
收费全文 | 457篇 |
免费 | 68篇 |
国内免费 | 1篇 |
专业分类
化学 | 10篇 |
力学 | 14篇 |
综合类 | 10篇 |
数学 | 50篇 |
物理学 | 25篇 |
无线电 | 417篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2022年 | 8篇 |
2021年 | 7篇 |
2020年 | 10篇 |
2019年 | 10篇 |
2018年 | 9篇 |
2017年 | 15篇 |
2016年 | 20篇 |
2015年 | 14篇 |
2014年 | 29篇 |
2013年 | 18篇 |
2012年 | 38篇 |
2011年 | 22篇 |
2010年 | 24篇 |
2009年 | 30篇 |
2008年 | 22篇 |
2007年 | 34篇 |
2006年 | 30篇 |
2005年 | 22篇 |
2004年 | 22篇 |
2003年 | 26篇 |
2002年 | 16篇 |
2001年 | 11篇 |
2000年 | 13篇 |
1999年 | 3篇 |
1998年 | 13篇 |
1997年 | 12篇 |
1996年 | 7篇 |
1995年 | 6篇 |
1994年 | 7篇 |
1993年 | 3篇 |
1992年 | 5篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 3篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1981年 | 1篇 |
排序方式: 共有526条查询结果,搜索用时 437 毫秒
1.
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time. 相似文献
2.
Chen Hao 《中国科学A辑(英文版)》2006,49(5):715-720
In this paper, for the the primes p such that 3 is a divisor of p − 1, we prove a result which reduces the computation of the linear complexity of a sequence over GF(p
m) (any positive integer m) with the period 3n (n and p
m − 1 are coprime) to the computation of the linear complexities of three sequences with the period n. Combined with some known algorithms such as generalized Games-Chan algorithm, Berlekamp-Massey algorithm and Xiao-Wei-Lam-Imamura
algorithm, we can determine the linear complexity of any sequence over GF(p
m) with the period 3n (n and p
m
− 1 are coprime) more efficiently. 相似文献
3.
Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overhead (either area or performance). In this paper we investigate two systematic approaches to low-cost, low-latency CED for symmetric encryption algorithm RC6. The proposed techniques have been validated on FPGA implementations of RC6, one of the advanced encryption standard finalists. 相似文献
4.
由于密码分析研究的进展及DES自身的弱点,原64比特的DES将不能作为数据加密的标准算法而长期存在。在原来工作的基础上,本文提出了256比特的分组密码方案。密码算法由基于混沌映射的数字滤波器构造。 相似文献
5.
For pseudo-random generators where one or several LFSRs are combined by a memoryless function, it is known that the output sequences are correlated to certain LFSR-sequences whose correlation coefficients c
t
satisfy the equation
i
c
2
i
= 1. In this paper it is proved that a corresponding result also holds for generators whose LFSRs are connected to a combiner with memory.If correlation probabilities are conditioned on side information, e.g., on known output digits, it is shown that new or stronger correlations may occur. This is exemplified for the summation cipher with only two LFSRs where such correlations can be exploited in a known plaintext attack. A cryptanalytic algorithm is given which is shown to be successful for LFSRs of considerable length and with arbitrary feedback connection.A preliminary version of this paper was presented at Eurocrypt '90, May 21–24, Århus, Denmark, and has appeared in the proceedings, pp. 204–213. 相似文献
6.
7.
A chaotic-cipher-based packet body encryption algorithm for JPEG2000 images is proposed in this paper. In order to produce a compliant codestream, a 2-byte block encryption procedure including bit-wise exclusive OR and cyclic rotation operations is investigated. Moreover, a repeatedly encryption process is adopted to eliminate the undesirable marker codes during encryption. The repeatedly encryption process only introduces a negligible computational overhead. Both simulations and analysis show that the proposed algorithm is of high security and simplicity. Therefore, these good properties make the algorithm efficient to process and useful for image applications. 相似文献
8.
Nonlinear filter generators are commonly used as keystream generators in stream ciphers. A nonlinear filter generator utilizes a nonlinear filtering function to combine the outputs of a linear feedback shift register (LFSR) to improve the linear complexity of keystream sequences. However, the LFSR-based stream ciphers are still potentially vulnerable to algebraic attacks that recover the key from some keystream bits. Although the known algebraic attacks only require polynomial time complexity of computations, all have their own constraints. This paper uses the linearization of nonlinear filter generators to cryptanalyze LFSR-based stream ciphers. Such a method works for any nonlinear filter generators. Viewing a nonlinear filter generator as a Boolean network that evolves as an automaton through Boolean functions, we first give its linearization representation. Compared to the linearization representation in Limniotis et al. (2008), this representation requires lower spatial complexity of computations in most cases. Based on the representation, the key recoverability is analyzed via the observability of Boolean networks. An algorithm for key recovery is given as well. Compared to the exhaustive search to recover the key, using this linearization representation requires lower time complexity of computations, though it leads to exponential time complexity. 相似文献
9.
随着智能移动设备的广泛普及,家庭用户逐渐渴望能够在智能终端上收看数字电视节目。由于传统家庭内部的机顶盒只能提供有线数字电视信号,因此本文研究了一种基于UDP协议的室内无线接收DVB-C信号的方法,并分析了MPEG-2 TS的相关原理及室内无线传输损耗,在此基础上讨论了方案的可行性。 相似文献
10.