期刊文献+
共找到1,183篇文章
< 1 2 60 >
每页显示 20 50 100
可重构密码协处理器指令系统的设计方法 被引量:11
1
作者 曲英杰 刘卫东 战嘉瑾 《计算机工程与应用》 CSCD 北大核心 2004年第2期10-12,22,共4页
可重构密码协处理器是采用可重构体系结构的思想和方法设计而成的,用于对数据进行加/解密处理的集成电路芯片,它能够灵活、快速地实现多种不同的密码算法。文章提出了可重构密码协处理器的指令系统的设计方法,并评估了按照该方法所设计... 可重构密码协处理器是采用可重构体系结构的思想和方法设计而成的,用于对数据进行加/解密处理的集成电路芯片,它能够灵活、快速地实现多种不同的密码算法。文章提出了可重构密码协处理器的指令系统的设计方法,并评估了按照该方法所设计的指令系统的特性。 展开更多
关键词 可重构 密码 协处理器 指令系统
下载PDF
Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage 被引量:12
2
作者 Yong CHENG Zhi-ying WANG +3 位作者 Jun MA Jiang-jiang WU Song-zhu MEI Jiang-chun REN 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2013年第2期85-97,共13页
It is secure for customers to store and share their sensitive data in the cryptographic cloud storage.However,the revocation operation is a sure performance killer in the cryptographic access control system.To optimiz... It is secure for customers to store and share their sensitive data in the cryptographic cloud storage.However,the revocation operation is a sure performance killer in the cryptographic access control system.To optimize the revocation procedure,we present a new efficient revocation scheme which is efficient,secure,and unassisted.In this scheme,the original data are first divided into a number of slices,and then published to the cloud storage.When a revocation occurs,the data owner needs only to retrieve one slice,and re-encrypt and re-publish it.Thus,the revocation process is accelerated by affecting only one slice instead of the whole data.We have applied the efficient revocation scheme to the ciphertext-policy attribute-based encryption(CP-ABE) based cryptographic cloud storage.The security analysis shows that our scheme is computationally secure.The theoretically evaluated and experimentally measured performance results show that the efficient revocation scheme can reduce the data owner's workload if the revocation occurs frequently. 展开更多
关键词 Revocation optimization cryptographic access control Cloud storage
原文传递
Breaking and Repairing the Certificateless Key Agreement Protocol from ASIAN 2006 被引量:8
3
作者 XIA Liang WANG Shengbao +1 位作者 SHEN Jiajun XU Guoming 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期562-566,共5页
The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their... The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties. 展开更多
关键词 cryptographic protocols key agreement certificate-less scheme CRYPTANALYSIS
下载PDF
基于密码学的访问控制和加密安全数据库 被引量:11
4
作者 袁春 文振焜 +1 位作者 张基宏 钟玉琢 《电子学报》 EI CAS CSCD 北大核心 2006年第11期2043-2046,共4页
在数据库安全领域的研究中,“数据库管理者”对数据库安全带来的安全隐患越来越受到研究者的关注,尤其是在基于互联网的网络应用提供商(Internet service provider)模式的数据库系统中,这种安全威胁更为严重.传统的数据库访问控制(存取... 在数据库安全领域的研究中,“数据库管理者”对数据库安全带来的安全隐患越来越受到研究者的关注,尤其是在基于互联网的网络应用提供商(Internet service provider)模式的数据库系统中,这种安全威胁更为严重.传统的数据库访问控制(存取控制)方法,对此安全隐患不能提供有效的安全防范.密码学的安全数据库技术,因为其基于数学难解问题的计算复杂性,成为解决数据库安全问题的日渐重要的方法.本文分析了迄今为止各种不同的,针对分布式数据库应用的安全威胁,并对密码学安全数据库中的基于密码学的访问控制算法和加密数据库技术进行了综述,并对各类方法的密码学原理,算法特性以及其优缺点进行了分析和描述. 展开更多
关键词 密码学 安全数据库 访问控制 加密数据库
下载PDF
Algebra model and security analysis for cryptographic protocols 被引量:8
5
作者 HUAIJinpeng LIXianxian 《Science in China(Series F)》 2004年第2期199-220,共22页
More and more cryptographic protocols have been used to achieve various security requirements of distributed systems in the open network environment. However cryptographic protocols are very difficult to design and an... More and more cryptographic protocols have been used to achieve various security requirements of distributed systems in the open network environment. However cryptographic protocols are very difficult to design and analyze due to the complexity of the cryptographic protocol execution, and a large number of problems are unsolved that range from the theory framework to the concrete analysis technique. In this paper, we build a new algebra called cryptographic protocol algebra (CPA) for describing the message operations with many cryptographic primitives, and proposed a new algebra model for cryptographic protocols based on the CPA. In the model, expanding processes of the participants knowledge on the protocol runs are characterized with some algebraic notions such as subalgebra, free generator and polynomial algebra, and attack processes are modeled with a new notion similar to that of the exact sequence used in homological algebra. Then we develope a mathematical approach to the cryptographic protocol security analysis. By using algebraic techniques, we have shown that for those cryptographic protocols with some symmetric properties, the execution space generated by an arbitrary number of participants may boil down to a smaller space generated by several honest participants and attackers. Furthermore we discuss the composability problem of cryptographic protocols and give a sufficient condition under which the protocol composed of two correct cryptographic protocols is still correct, and we finally offer a counterexample to show that the statement may not be true when the condition is not met. 展开更多
关键词 cryptographic protocol formal analysis information security algebra system.
原文传递
粗粒度可重构密码逻辑阵列智能映射算法研究 被引量:9
6
作者 杜怡然 杨萱 +2 位作者 戴紫彬 南龙梅 李伟 《电子学报》 EI CAS CSCD 北大核心 2020年第1期101-109,共9页
针对粗粒度可重构密码逻辑阵列密码算法映射周期长且性能不高的问题,该文通过构建粗粒度可重构密码逻辑阵列参数化模型,以密码算法映射时间及实现性能为目标,结合本文构建的粗粒度可重构密码逻辑阵列结构特征,提出了一种算法数据流图划... 针对粗粒度可重构密码逻辑阵列密码算法映射周期长且性能不高的问题,该文通过构建粗粒度可重构密码逻辑阵列参数化模型,以密码算法映射时间及实现性能为目标,结合本文构建的粗粒度可重构密码逻辑阵列结构特征,提出了一种算法数据流图划分算法.通过将密码算法数据流图中节点聚集成簇并以簇为最小映射粒度进行映射,降低算法映射复杂度;该文借鉴机器学习过程,构建了具备学习能力的智慧蚁群模型,提出了智慧蚁群优化算法,通过对训练样本的映射学习,持续优化初始化信息素浓度矩阵,提升算法映射收敛速度,以已知算法映射指导未知算法映射,实现密码算法映射的智能化.实验结果表明,本文提出的映射方法能够平均降低编译时间37.9%并实现密码算法映射性能最大,同时,以算法数据流图作为映射输入,自动化的生成密码算法映射流,提升了密码算法映射的直观性与便捷性. 展开更多
关键词 粗粒度 密码 阵列 智能映射 机器学习
下载PDF
可重构密码协处理器简介及其特性 被引量:7
7
作者 曲英杰 刘卫东 战嘉瑾 《计算机工程》 CAS CSCD 北大核心 2004年第13期166-168,共3页
可重构密码协处理器是采用可重构体系结构的思想和方法设计而成的,用于对数据进行加/解密处理的集成电路芯片,它能够灵活、快速地实现多种不同的密码算法。文章简要介绍了可重构密码协处理器的设计方法和使用方法,并对其灵活性、安全性... 可重构密码协处理器是采用可重构体系结构的思想和方法设计而成的,用于对数据进行加/解密处理的集成电路芯片,它能够灵活、快速地实现多种不同的密码算法。文章简要介绍了可重构密码协处理器的设计方法和使用方法,并对其灵活性、安全性、性能和规模进行了分析。 展开更多
关键词 可重构 密码 协处理器
下载PDF
New Semantic Model for Authentication Protocols in ASMs 被引量:5
8
作者 RuiXue Deng-GuoFeng 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第4期555-563,共9页
A new semantic model in Abstract State Model (ASM) for authentication protocols is presented. It highlights the Woo-Lam's ideas for authentication, which is the strongest one in Lowe's definition hierarchy for... A new semantic model in Abstract State Model (ASM) for authentication protocols is presented. It highlights the Woo-Lam's ideas for authentication, which is the strongest one in Lowe's definition hierarchy for entity authentication. Apart from the flexible and natural features in forming and analyzing protocols inherited from ASM, the model defines both authentication and secrecy properties explicitly in first order sentences as invariants. The process of proving security properties with respect to an authentication protocol blends the correctness and secrecy properties together to avoid the potential flaws which may happen when treated separately. The security of revised Helsinki protocol is shown as a case study. The new model is different from the previous ones in ASMs. 展开更多
关键词 cryptographic protocol formal analysis abstract state machine (ASM) authentication protocol
原文传递
Data Secure Storage Mechanism for IIoT Based on Blockchain 被引量:1
9
作者 Jin Wang Guoshu Huang +2 位作者 R.Simon Sherratt Ding Huang Jia Ni 《Computers, Materials & Continua》 SCIE EI 2024年第3期4029-4048,共20页
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi... With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of IIoT.Blockchain technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the IIoT.In the traditional blockchain,data is stored in a Merkle tree.As data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based IIoT.Accordingly,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of data.To solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC structure.Secondly,this paper uses PVC instead of the Merkle tree to store big data generated by IIoT.PVC can improve the efficiency of traditional VC in the process of commitment and opening.Finally,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of experiments.This mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT. 展开更多
关键词 Blockchain IIoT data storage cryptographic commitment
下载PDF
RFID在电力物联网应用中的信息安全风险及防护策略分析 被引量:4
10
作者 刘扬 李钊 +1 位作者 丛海洋 王彪 《东北电力技术》 2013年第12期40-43,共4页
RFID是一种在物联网中广泛应用的非接触式自动识别技术,目前已应用于电力系统发电、输电、变电、配电和用电等环节中,但由于物联网环境的复杂性及RFID技术本身的缺陷,RFID在物联网应用中尚存在诸多安全隐患。首先论述了RFID面临的信息... RFID是一种在物联网中广泛应用的非接触式自动识别技术,目前已应用于电力系统发电、输电、变电、配电和用电等环节中,但由于物联网环境的复杂性及RFID技术本身的缺陷,RFID在物联网应用中尚存在诸多安全隐患。首先论述了RFID面临的信息安全威胁及相应安全防护策略,在信息安全的机密性、完整性和可用性3个方面对RFID安全风险与防护策略进行了分析和比较,最后展望了RFID未来安全发展方向。 展开更多
关键词 安全风险 密码防护策略 非密码防护策略
下载PDF
Digital signature systems based on smart card and fingerprint feature 被引量:3
11
作者 You Lin Xu Maozhi Zheng Zhiming 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期825-834,共10页
Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerpr... Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerprint features match his stored template. To resist being tampered on public channel, the user's message and the signed message are encrypted by the signer's public key and the user's public key, respectively. In the other signature system, the keys are generated by combining the signer's fingerprint features, check bits, and a rememberable key, and there are no matching process and keys stored on the smart card. Additionally, there is generally more than one public key in this system, that is, there exist some pseudo public keys except a real one. 展开更多
关键词 digital signature fingerprint feature error-correcting code cryptographic key smart card
下载PDF
Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing
12
作者 Nader Abdel Karim Osama A.Khashan +4 位作者 Waleed K.Abdulraheem Moutaz Alazab Hasan Kanaker Mahmoud E.Farfoura Mohammad Alshinwan 《Computers, Materials & Continua》 SCIE EI 2024年第2期2023-2045,共23页
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i... As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads. 展开更多
关键词 Cloud computing performance VIRTUALIZATION hypervisors HYPER-V KVM cryptographic algorithm
下载PDF
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
13
作者 Fauziyah Zhaoshun Wang Mujahid Tabassum 《Computers, Materials & Continua》 SCIE EI 2024年第3期4417-4452,共36页
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method... In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated challenges.This article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic processes.We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering.Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information security.Our method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key exchanges.We also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and reliability.To gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various techniques.Notably,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing methods.Furthermore,with integrity metrics at 9.35,the protocol’s resilience is further affirmed.These metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security. 展开更多
关键词 cryptographic SECURITY privacy preservation DECRYPTION INTEGRITY
下载PDF
Researching and implementation of reconfigurable Hash chip based on FPGA 被引量:3
14
作者 Yang Xiaohui Dai Zibin Liu Yuanfeng Wang Ting 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第1期183-187,共5页
The reconfigurable cryptographic chip is an integrated circuit that is designed by means of the method of reconfigurable architecture, and is used for encryption and decryption. Many different cipher algorithms can be... The reconfigurable cryptographic chip is an integrated circuit that is designed by means of the method of reconfigurable architecture, and is used for encryption and decryption. Many different cipher algorithms can be flexibly implemented with the aid of a reconfigurable cryptographic chip and can be used in many fields. This article takes an example for the SHA-1/224/256 algorithms, and then designs a reconfigurable cryptographic chip based on the thought and method of the reconfigurable architecture. Finally, this paper gives the implementation result based on the FPGA of the family of Stratix II of Altera Corporation, and presents a good research trend for resolving the storage in hardware implementation using FPGAs. 展开更多
关键词 Reconfigurable cryptographic chip FPGA
下载PDF
An Efficient Key Assignment Scheme Based on One—Way Hash Function in a User Hierarchy 被引量:3
15
作者 Tzer-ShyongChen Yu-FangChung 《Journal of Computer Science & Technology》 SCIE EI CSCD 2003年第2期210-213,共4页
In order to solve the problems resulted from dynamic access control in a userhierarchy, a cryptographic key assignment scheme is proposed by Prof. Lin to promote the performingability and to simplify the procedure. Ho... In order to solve the problems resulted from dynamic access control in a userhierarchy, a cryptographic key assignment scheme is proposed by Prof. Lin to promote the performingability and to simplify the procedure. However, it may cause the security in danger as the userchanges his secret key; besides, some secret keys may be disclosed due to the unsuitable selectionof the security classes' identities. Through setting up a one-way hash function onto Lin's scheme,the proposed modification can greatly improve the security of Lin's scheme. 展开更多
关键词 cryptography access control cryptographic key assignment one-way hashfunction user hierarchy
原文传递
WBZUC:novel white-box ZUC-128 stream cipher 被引量:1
16
作者 Yang Yatao Zhang Ruoqing +2 位作者 Dong hui Ma Yingjie Zhang Xiaowei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2023年第2期96-106,共11页
White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in ... White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in mobile communication.However,research work on white-box cryptographic implementation for stream cipher is rare.A new white-box Zu Chongzhi-128(ZUC-128)cryptographic implementation algorithm named WBZUC was proposed.WBZUC adopts lookup table and random coding in the non-linear function to make the intermediate value chaotic without changing the final encryption result.Thus,the WBZUC algorithm’s security gets improved compared with the original ZUC-128 algorithm.As for the efficiency,a test experiment on WBZUC shows that the average speed of key generation,encryption,and decryption can reach at 33.74 kbit/s,23.31 kbit/s,24.06 kbit/s respectively.Despite its running speed is relatively a bit lower than original ZUC-128 algorithm,WBZUC can provide better security and comprehensive performance in mobile communication system environment. 展开更多
关键词 Zu Chongzhi-128(ZUC-128)algorithm white-box cryptography cryptographic implementation lookup table secure communication
原文传递
数据加密在远程监控系统中的应用研究 被引量:1
17
作者 张京 《电子科技大学学报》 EI CAS CSCD 北大核心 2001年第6期576-579,共4页
寻呼发射机是无线寻呼系统中的关键设备之一,针对其可靠工作和安全运行问题,提出了一种专用远程监控系统,介绍了智能寻呼发射机监控系统中的系统组成和系统功能,并论述了系统的硬件设计方案,从地址码和遥控命令集的设计等方面分析了系... 寻呼发射机是无线寻呼系统中的关键设备之一,针对其可靠工作和安全运行问题,提出了一种专用远程监控系统,介绍了智能寻呼发射机监控系统中的系统组成和系统功能,并论述了系统的硬件设计方案,从地址码和遥控命令集的设计等方面分析了系统中遥控遥测的实现原理,并重点讨论了系统为保障数据安全而采用的 IDEA数据加密算法与 MD5报文鉴别等关键实现技术。现场测试表明,该监控系统对提高寻呼发射机运行的安全性和可靠性具有重要作用。 展开更多
关键词 遥控遥测 监控系统 数据加密 移动通信 寻呼发射机
下载PDF
A survey on the adoption of blockchain in IoT:challenges and solutions 被引量:5
18
作者 Md Ashraf Uddin Andrew Stranieri +1 位作者 Iqbal Gondal Venki Balasubramanian 《Blockchain(Research and Applications)》 2021年第2期1-49,共49页
Conventional Internet of Things(IoT)ecosystems involve data streaming from sensors,through Fog devices to a centralized Cloud server.Issues that arise include privacy concerns due to third party management of Cloud se... Conventional Internet of Things(IoT)ecosystems involve data streaming from sensors,through Fog devices to a centralized Cloud server.Issues that arise include privacy concerns due to third party management of Cloud servers,single points of failure,a bottleneck in data flows and difficulties in regularly updating firmware for millions of smart devices from a point of security and maintenance perspective.Blockchain technologies avoid trusted third parties and safeguard against a single point of failure and other issues.This has inspired researchers to investigate blockchain’s adoption into IoT ecosystem.In this paper,recent state-of-the-arts advances in blockchain for IoT,blockchain for Cloud IoT and blockchain for Fog IoT in the context of eHealth,smart cities,intelligent transport and other applications are analyzed.Obstacles,research gaps and potential solutions are also presented. 展开更多
关键词 Blockchain technology Consensus mechanism Blockchain cryptographic primitives healthcare Patient monitoring Cloud of Things Internet of Things Fog of Things Software defined network Blockchain applications
原文传递
基于指纹识别的B/S结构安全系统的实现 被引量:4
19
作者 陈炳发 沈锋 《中国制造业信息化(学术版)》 2003年第12期102-104,共3页
实现了一个基于指纹识别与认证的B/S结构的安全系统框架。该系统用指纹采集设备读取指纹数据 ,在B/S结构的应用系统中识别与认证。系统基于微软 .Net框架进行设计 ,利用其丰富的类库和XML技术 ,运用远程对象、数据组装加密等关键技术 ,... 实现了一个基于指纹识别与认证的B/S结构的安全系统框架。该系统用指纹采集设备读取指纹数据 ,在B/S结构的应用系统中识别与认证。系统基于微软 .Net框架进行设计 ,利用其丰富的类库和XML技术 ,运用远程对象、数据组装加密等关键技术 ,采取指纹数据识别与认证、分级安全策略等措施 ,有效提高了系统整体的安全性 。 展开更多
关键词 指纹识别 B/S结构 安全系统 密码术 NET框架 XML技术 指纹数据采集 授权过程 生物识别技术
下载PDF
Research of the Kernel Operator Library Based on Cryptographic Algorithm 被引量:1
20
作者 王以刚 钱力 黄素梅 《Journal of Donghua University(English Edition)》 EI CAS 2001年第4期45-48,共4页
The variety of encryption mechanism and algorithms which were conventionally used have some limitations.The kernel operator library based on Cryptographic algorithm is put forward. Owing to the impenetrability of algo... The variety of encryption mechanism and algorithms which were conventionally used have some limitations.The kernel operator library based on Cryptographic algorithm is put forward. Owing to the impenetrability of algorithm, the data transfer system with the cryptographic algorithm library has many remarkable advantages in algorithm rebuilding and optimization,easily adding and deleting algorithm, and improving the security power over the traditional algorithm. The user can choose any one in all algorithms with the method against any attack because the cryptographic algorithm library is extensible. 展开更多
关键词 CRYPTOLOGY cryptographic algorithm ALGORITHM library cryptographic mechanism OPERATOR
下载PDF
上一页 1 2 60 下一页 到第
使用帮助 返回顶部