期刊文献+
共找到715篇文章
< 1 2 36 >
每页显示 20 50 100
基于改进sha-3的TESLA导航电文认证方法
1
作者 李泽宇 魏蛟龙 +2 位作者 王莘然 熊蓄 唐祖平 《电子信息对抗技术》 2026年第1期8-16,共9页
针对民用导航信号容易遭受欺骗攻击的问题,提出了一种基于改进sha-3的时间效应流丢失容错认证算法(Timed Efficient Stream Loss-tolerant Algorithm,TESLA)的导航电文认证方法。相比于现有方法普遍采用第二代安全哈希函数sha-256作为... 针对民用导航信号容易遭受欺骗攻击的问题,提出了一种基于改进sha-3的时间效应流丢失容错认证算法(Timed Efficient Stream Loss-tolerant Algorithm,TESLA)的导航电文认证方法。相比于现有方法普遍采用第二代安全哈希函数sha-256作为加密函数,其在采用第三代安全哈希函数sha-3基础上对轮常数进行改进设计,得到了位数更少的轮常数变换表,与原函数相比,将轮常数由64位减少到5位,综合多轮迭代降低了计算复杂度和硬件成本。仿真结果表明,改进的函数和基准的第三代函数具有相同的认证性能,在雪崩效应、混乱扩散能力和抗碰撞能力方面也有相同表现。 展开更多
关键词 导航电文认证 sha-3 哈希函数 轮常数
在线阅读 下载PDF
Non-Neural 3D Nasal Reconstruction:A Sparse Landmark Algorithmic Approach for Medical Applications
2
作者 Nguyen Khac Toan Ho Nguyen Anh Tuan Nguyen Truong Thinh 《Computer Modeling in Engineering & Sciences》 2025年第5期1273-1295,共23页
This paper presents a novel method for reconstructing a highly accurate 3D nose model of the human from 2D images and pre-marked landmarks based on algorithmic methods.The study focuses on the reconstruction of a 3D n... This paper presents a novel method for reconstructing a highly accurate 3D nose model of the human from 2D images and pre-marked landmarks based on algorithmic methods.The study focuses on the reconstruction of a 3D nose model tailored for applications in healthcare and cosmetic surgery.The approach leverages advanced image processing techniques,3D Morphable Models(3DMM),and deformation techniques to overcome the limita-tions of deep learning models,particularly addressing the interpretability issues commonly encountered in medical applications.The proposed method estimates the 3D coordinates of landmark points using a 3D structure estimation algorithm.Sub-landmarks are extracted through image processing techniques and interpolation.The initial surface is generated using a 3DMM,though its accuracy remains limited.To enhance precision,deformation techniques are applied,utilizing the coordinates of 76 identified landmarks and sub-landmarks.The resulting 3D nose model is constructed based on algorithmic methods and pre-marked landmarks.Evaluation of the 3D model is conducted by comparing landmark distances and shape similarity with expert-determined ground truth on 30 Vietnamese volunteers aged 18 to 47,all of whom were either preparing for or required nasal surgery.Experimental results demonstrate a strong agreement between the reconstructed 3D model and the ground truth.The method achieved a mean landmark distance error of 0.631 mm and a shape error of 1.738 mm,demonstrating its potential for medical applications. 展开更多
关键词 Nose reconstruction 3D reconstruction medical applications algorithmic reconstruction enhanced 3D model
在线阅读 下载PDF
Rock discontinuity extraction from 3D point clouds using pointwise clustering algorithm
3
作者 Xiaoyu Yi Wenxuan Wu +2 位作者 Wenkai Feng Yongjian Zhou Jiachen Zhao 《Journal of Rock Mechanics and Geotechnical Engineering》 2025年第7期4429-4444,共16页
Recognizing discontinuities within rock masses is a critical aspect of rock engineering.The development of remote sensing technologies has significantly enhanced the quality and quantity of the point clouds collected ... Recognizing discontinuities within rock masses is a critical aspect of rock engineering.The development of remote sensing technologies has significantly enhanced the quality and quantity of the point clouds collected from rock outcrops.In response,we propose a workflow that balances accuracy and efficiency to extract discontinuities from massive point clouds.The proposed method employs voxel filtering to downsample point clouds,constructs a point cloud topology using K-d trees,utilizes principal component analysis to calculate the point cloud normals,and employs the pointwise clustering(PWC)algorithm to extract discontinuities from rock outcrop point clouds.This method provides information on the location and orientation(dip direction and dip angle)of the discontinuities,and the modified whale optimization algorithm(MWOA)is utilized to identify major discontinuity sets and their average orientations.Performance evaluations based on three real cases demonstrate that the proposed method significantly reduces computational time costs without sacrificing accuracy.In particular,the method yields more reasonable extraction results for discontinuities with certain undulations.The presented approach offers a novel tool for efficiently extracting discontinuities from large-scale point clouds. 展开更多
关键词 Rock mass discontinuity 3D point clouds Pointwise clustering(PWC)algorithm Modified whale optimization algorithm(MWOA)
在线阅读 下载PDF
3D numerical manifold method for crack propagation in rock materials using a local tracking algorithm
4
作者 Boyi Su Tao Xu +3 位作者 Genhua Shi Michael J.Heap Xianyang Yu Guanglei Zhou 《Journal of Rock Mechanics and Geotechnical Engineering》 2025年第6期3449-3463,共15页
The modeling of crack growth in three-dimensional(3D)space poses significant challenges in rock mechanics due to the complex numerical computation involved in simulating crack propagation and interaction in rock mater... The modeling of crack growth in three-dimensional(3D)space poses significant challenges in rock mechanics due to the complex numerical computation involved in simulating crack propagation and interaction in rock materials.In this study,we present a novel approach that introduces a 3D numerical manifold method(3D-NMM)with a geometric kernel to enhance computational efficiency.Specifically,the maximum tensile stress criterion is adopted as a crack growth criterion to achieve strong discontinuous crack growth,and a local crack tracking algorithm and an angle correction technique are incorporated to address minor limitations of the algorithm in a 3D model.The implementation of the program is carried out in Python,using object-oriented programming in two independent modules:a calculation module and a crack module.Furthermore,we propose feasible improvements to enhance the performance of the algorithm.Finally,we demonstrate the feasibility and effectiveness of the enhanced algorithm in the 3D-NMM using four numerical examples.This study establishes the potential of the 3DNMM,combined with the local tracking algorithm,for accurately modeling 3D crack propagation in brittle rock materials. 展开更多
关键词 3D numerical manifold method(3D NMM) Crack propagation Local tracking algorithm Brittle materials
在线阅读 下载PDF
A 3-Dimensional Cargo Loading Algorithm for the Conveyor-Type Loading System
5
作者 Hyeonbin Jeong Young Tae Ryu +1 位作者 Byung Duk Song Sang-Duck Lee 《Computer Modeling in Engineering & Sciences》 2025年第3期2739-2769,共31页
This paper proposes a novel cargo loading algorithm applicable to automated conveyor-type loading systems.The algorithm offers improvements in computational efficiency and robustness by utilizing the concept of discre... This paper proposes a novel cargo loading algorithm applicable to automated conveyor-type loading systems.The algorithm offers improvements in computational efficiency and robustness by utilizing the concept of discrete derivatives and introducing logistics-related constraints.Optional consideration of the rotation of the cargoes was made to further enhance the optimality of the solutions,if possible to be physically implemented.Evaluation metrics were developed for accurate evaluation and enhancement of the algorithm’s ability to efficiently utilize the loading space and provide a high level of dynamic stability.Experimental results demonstrate the extensive robustness of the proposed algorithm to the diversity of cargoes present in Business-to-Consumer environments.This study contributes practical advancements in both cargo loading optimization and automation of the logistics industry,with potential applications in last-mile delivery services,warehousing,and supply chain management. 展开更多
关键词 3-dimensional loading automated loading system B2C logistics cargo loading algorithm conveyortype loading
在线阅读 下载PDF
A novel heuristic pathfinding algorithm for 3D security modeling and vulnerability assessment
6
作者 Jun Yang Yue-Ming Hong +2 位作者 Yu-Ming Lv Hao-Ming Ma Wen-Lin Wang 《Nuclear Science and Techniques》 2025年第5期152-166,共15页
Vulnerability assessment is a systematic process to identify security gaps in the design and evaluation of physical protection systems.Adversarial path planning is a widely used method for identifying potential vulner... Vulnerability assessment is a systematic process to identify security gaps in the design and evaluation of physical protection systems.Adversarial path planning is a widely used method for identifying potential vulnerabilities and threats to the security and resilience of critical infrastructures.However,achieving efficient path optimization in complex large-scale three-dimensional(3D)scenes remains a significant challenge for vulnerability assessment.This paper introduces a novel A^(*)-algorithmic framework for 3D security modeling and vulnerability assessment.Within this framework,the 3D facility models were first developed in 3ds Max and then incorporated into Unity for A^(*)heuristic pathfinding.The A^(*)-heuristic pathfinding algorithm was implemented with a geometric probability model to refine the detection and distance fields and achieve a rational approximation of the cost to reach the goal.An admissible heuristic is ensured by incorporating the minimum probability of detection(P_(D)^(min))and diagonal distance to estimate the heuristic function.The 3D A^(*)heuristic search was demonstrated using a hypothetical laboratory facility,where a comparison was also carried out between the A^(*)and Dijkstra algorithms for optimal path identification.Comparative results indicate that the proposed A^(*)-heuristic algorithm effectively identifies the most vulnerable adversarial pathfinding with high efficiency.Finally,the paper discusses hidden phenomena and open issues in efficient 3D pathfinding for security applications. 展开更多
关键词 Physical protection system 3D modeling and simulation Vulnerability assessment A^(*)Heuristic Pathfinding Dijkstra algorithm
在线阅读 下载PDF
Advanced 3D Wind Farm Layout Optimization Framework via Power-Law Perturbation-Based Genetic Algorithm
7
作者 Jiaru Yang Yaotong Song +3 位作者 Jun Tang Weiping Ding Zhenyu Lei Shangce Gao 《IEEE/CAA Journal of Automatica Sinica》 2025年第11期2314-2328,共15页
The modeling and optimization of wind farm layouts can effectively reduce the wake effect between turbine units,thereby enhancing the expected output power and avoiding negative influence.Traditional wind farm optimiz... The modeling and optimization of wind farm layouts can effectively reduce the wake effect between turbine units,thereby enhancing the expected output power and avoiding negative influence.Traditional wind farm optimization often uses idealized wake models,neglecting the influence of wind shear at different elevations,which leads to a lack of precision in estimating wake effects and fails to meet the accuracy and reliability requirements of practical engineering.To address this,we have constructed a three-dimensional 3D wind farm optimization model that incorporates elevation,utilizing a 3D wake model to better reflect real-world conditions.We aim to assess the optimization state of the algorithm and provide strong incentives at the right moments to ensure continuous evolution of the population.To this end,we propose an evolutionary adaptation degreeguided genetic algorithm based on power-law perturbation(PPGA)to adapt multidimensional conditions.We select the offshore wind power project in Nantong,Jiangsu,China,as a study example and compare PPGA with other well-performing algorithms under this practical project.Based on the actual wind condition data,the experimental results demonstrate that PPGA can effectively tackle this complex problem and achieve the best power efficiency. 展开更多
关键词 3D wake model China’s southeastern coast metaheuristic offshore wind farm power-law perturbation-based genetic algorithm(PPGA)
在线阅读 下载PDF
Flexible Monolithic 3D-Integrated Self-Powered Tactile Sensing Array Based on Holey MXene Paste
8
作者 Mengjie Wang Chen Chen +9 位作者 Yuhang Zhang Yanan Ma Li Xu Dan‑Dan Wu Bowen Gao Aoyun Song Li Wen Yongfa Cheng Siliang Wang Yang Yue 《Nano-Micro Letters》 2026年第2期772-785,共14页
Flexible electronics face critical challenges in achieving monolithic three-dimensional(3D)integration,including material compatibility,structural stability,and scalable fabrication methods.Inspired by the tactile sen... Flexible electronics face critical challenges in achieving monolithic three-dimensional(3D)integration,including material compatibility,structural stability,and scalable fabrication methods.Inspired by the tactile sensing mechanism of the human skin,we have developed a flexible monolithic 3D-integrated tactile sensing system based on a holey MXene paste,where each vertical one-body unit simultaneously functions as a microsupercapacitor and pressure sensor.The in-plane mesopores of MXene significantly improve ion accessibility,mitigate the self-stacking of nanosheets,and allow the holey MXene to multifunctionally act as a sensing material,an active electrode,and a conductive interconnect,thus drastically reducing the interface mismatch and enhancing the mechanical robustness.Furthermore,we fabricate a large-scale device using a blade-coating and stamping method,which demonstrates excellent mechanical flexibility,low-power consumption,rapid response,and stable long-term operation.As a proof-of-concept application,we integrate our sensing array into a smart access control system,leveraging deep learning to accurately identify users based on their unique pressing behaviors.This study provides a promising approach for designing highly integrated,intelligent,and flexible electronic systems for advanced human-computer interactions and personalized electronics. 展开更多
关键词 Holey MXene Microsupercapacitor Tactile sensor Monolithic 3D integration Deep learning algorithm
在线阅读 下载PDF
Robust cooperative spectrum sensing in cognitive radio blockchain network using SHA-3 algorithm
9
作者 Evelyn Ezhilarasi I J.Christopher Clement 《Blockchain(Research and Applications)》 2024年第4期61-69,共9页
Cognitive radio network(CRN)uses the available spectrum resources wisely.Spectrum sensing is the central element of a CRN.However,spectrum sensing is susceptible to multiple security breaches caused by malicious users... Cognitive radio network(CRN)uses the available spectrum resources wisely.Spectrum sensing is the central element of a CRN.However,spectrum sensing is susceptible to multiple security breaches caused by malicious users(MUs).These attackers attempt to change the sensed result in order to decrease network performance.In our proposed approach,with the help of blockchain-based technology,the fusion center is able to detect and prevent such criminal activities.The method of our model makes use of blockchain-based MU detection with SHA-3 hashing and energy detection-based spectrum sensing.The detection strategy takes place in two stages:block updation phase and iron out phase.The simulation results of the proposed method demonstrate 3.125%,6.5%,and 8.8%more detection probability at−5 dB signal-to-noise ratio(SNR)in the presence of MUs,when compared to other methods like equal gain combining(EGC),blockchain-based cooperative spectrum sensing(BCSS),and fault-tolerant cooperative spectrum sensing(FTCSS),respectively.Thus,the security of cognitive radio blockchain network is proved to be significantly improved. 展开更多
关键词 Spectrum sensing Blockchain Cognitive radio network sha-3 Malicious users
原文传递
SM3及SHA-2系列算法硬件可重构设计与实现 被引量:11
10
作者 朱宁龙 戴紫彬 +1 位作者 张立朝 赵峰 《微电子学》 CAS CSCD 北大核心 2015年第6期777-780,784,共5页
针对当前国内外杂凑算法标准和应用需求不同的现状,采用数据流可重构的设计思想和方法,在对SM3及SHA-2系列杂凑算法的不同特征进行分析研究的基础上,总结归纳出统一的处理模型,进而设计了一种新的硬件结构。基于该结构,根据不同环境对... 针对当前国内外杂凑算法标准和应用需求不同的现状,采用数据流可重构的设计思想和方法,在对SM3及SHA-2系列杂凑算法的不同特征进行分析研究的基础上,总结归纳出统一的处理模型,进而设计了一种新的硬件结构。基于该结构,根据不同环境对杂凑算法安全强度的不同要求,可以单独灵活地实现SM3,SHA-256,SHA-384及SHA-512算法。实验结果表明,设计的硬件电路有效降低了硬件资源消耗,提高了系统吞吐率,能够满足国内外商用杂凑算法的要求。 展开更多
关键词 杂凑算法 SM3 sha-2 可重构 硬件设计
原文传递
小面积高性能的SHA-1/SHA-256/SM3IP复用电路的设计 被引量:2
11
作者 郑朝霞 田园 +1 位作者 蔚然 高峻 《计算机工程与科学》 CSCD 北大核心 2015年第8期1417-1422,共6页
Hash算法的快速发展导致了两个问题,一个是旧算法与新算法在应用于产品时更新换代的问题,另一个是基于应用环境的安全性选择不同算法时的复用问题。为解决这两个问题,实现了SHA-1/SHA-256/SM3算法的IP复用电路,电路采用循环展开方式,并... Hash算法的快速发展导致了两个问题,一个是旧算法与新算法在应用于产品时更新换代的问题,另一个是基于应用环境的安全性选择不同算法时的复用问题。为解决这两个问题,实现了SHA-1/SHA-256/SM3算法的IP复用电路,电路采用循环展开方式,并加入流水线的设计,在支持多种算法的同时,还具有小面积高性能的优势。首先,基于Xilinx Virtex-6FPGA对电路设计进行性能分析,电路共占用776Slice单元,最大吞吐率可以达到0.964Gbps。然后,采用SMIC 0.13μm CMOS工艺实现了该设计,最后电路的面积是30.6k门,比单独实现三种算法的电路面积总和减小了41.7%,工作频率是177.62 MHz,最大吞吐率达到1.34Gbps。 展开更多
关键词 HASH算法 sha-1 sha-256 SM3 IP复用
在线阅读 下载PDF
SHA-3候选算法Keccak的Matlab设计与实现 被引量:3
12
作者 刘花 包小敏 《计算机科学》 CSCD 北大核心 2012年第B06期425-428,共4页
由NIST发起的新一代Hash函数标准SHA-3的全球公开征集过程目前已进入最后一轮筛选,Keccak是进入最后一轮的5个候选者之一。介绍了Keccak算法及特点,给出了一种基于Matlab、带有图形界面GUI的Keccak程序设计与实现过程。本程序既可用于... 由NIST发起的新一代Hash函数标准SHA-3的全球公开征集过程目前已进入最后一轮筛选,Keccak是进入最后一轮的5个候选者之一。介绍了Keccak算法及特点,给出了一种基于Matlab、带有图形界面GUI的Keccak程序设计与实现过程。本程序既可用于实际的Keccak Hash值运算,最重要的是为Keccak的教学与研究提供了一个方便直观的工具。 展开更多
关键词 HASH sha-3 Keccak SPONGE MATLAB
在线阅读 下载PDF
SHA-3获胜算法:Keccak评析 被引量:3
13
作者 李梦东 邵鹏林 李小龙 《北京电子科技学院学报》 2013年第2期18-23,共6页
2012年10月初NIST确定SHA-3获胜算法为Keccak,为此该算法目前成为人们关注的焦点。本文对Keccak算法的实现过程、性能特点、获胜理由和攻击现状等进行了简评。通过这些介绍可达到初步了解Keccak的目的。
关键词 HASH函数 sha-3 KeccakSponge
在线阅读 下载PDF
应用于后量子密码的高速高效SHA-3硬件单元设计 被引量:1
14
作者 刘冬生 陈勇 +2 位作者 熊思琦 杨朔 胡昂 《信息安全学报》 CSCD 2021年第6期32-39,共8页
随着量子计算技术的高速发展,传统的公钥密码体制正在遭受破译的威胁,将现有加密技术过渡到具有量子安全的后量子密码方案上是现阶段密码学界的研究热点。在现有的后量子密码(Post-Quantum Cryptography,PQC)方案中,基于格问题的密码方... 随着量子计算技术的高速发展,传统的公钥密码体制正在遭受破译的威胁,将现有加密技术过渡到具有量子安全的后量子密码方案上是现阶段密码学界的研究热点。在现有的后量子密码(Post-Quantum Cryptography,PQC)方案中,基于格问题的密码方案由于其安全性,易实施性和使用灵活的众多优点,成为了最具潜力的PQC方案。SHA-3作为格密码方案中用于生成伪随机序列以及对关键信息散列的核心算子之一,其实现性能对整体后量子密码方案性能具有重要影响。考虑到今后PQC在多种设备场景下部署的巨大需求,SHA-3的硬件实现面临着高性能与有限资源开销相互制约的瓶颈挑战。对此,本文提出了一种高效高速的SHA-3硬件结构,这种结构可以应用于所有的SHA-3家族函数中。首先,本设计将64 bit轮常数简化为7 bit,既减少了轮常数所需的存储空间,也降低了运算复杂度。其次,提出了一种新型的流水线结构,这种新型结构相比于通常的流水线结构对关键路径分割得更加均匀。最后,将新型流水线结构与展开的优化方法结合,使系统的吞吐量大幅提高。本设计基于Xilinx Virtex-6现场可编程逻辑阵列(FPGA)完成了原型实现,结果显示,所设计的SHA-3硬件单元最高工作频率可达459 MHz,效率达到14.71 Mbps/Slice。相比于现有的相关设计,最大工作频率提高了10.9%,效率提升了28.2%。 展开更多
关键词 后量子密码 哈希算法 硬件实现 sha-3
在线阅读 下载PDF
基于LUT的高速低硬件开销SHA-3算法设计 被引量:1
15
作者 张跃军 廖澴桓 丁代鲁 《电子技术应用》 北大核心 2017年第4期43-46,共4页
通过对SHA-3算法和查找表(Look-Up-Table,LUT)方法的研究,提出一种高速低硬件开销SHA-3算法设计方案。首先,该方案利用状态机实现SHA-3算法核心置换函数的轮运算,并结合LUT方法处理每轮运算的数据交换和数据存储;然后,采用硬件模块并行... 通过对SHA-3算法和查找表(Look-Up-Table,LUT)方法的研究,提出一种高速低硬件开销SHA-3算法设计方案。首先,该方案利用状态机实现SHA-3算法核心置换函数的轮运算,并结合LUT方法处理每轮运算的数据交换和数据存储;然后,采用硬件模块并行处理和存储单元共用的方式,提高SHA-3算法的速度、降低硬件开销。最后,在SMIC 65nm CMOS工艺下设计SHA-3算法,DC综合后电路面积为65 833μm^2,在1.2V电压下最高工作频率可达到150MHz,功耗为2.5mW。 展开更多
关键词 sha-3算法 LUT查找表 高速 低硬件开销 CMOS电路
在线阅读 下载PDF
针对SHA-3算法核心置换的旋转攻击
16
作者 曹进克 李云强 赵土华 《信息工程大学学报》 2015年第3期281-284,302,共5页
针对SHA-3算法核心置换的旋转攻击,分析了SHA-3算法中编码环节对旋转性的影响,证明了在去掉常数的条件下SHA-3算法的置换能以概率为1保持旋转性;在保留常数的情况下研究了SHA-3算法中编码环节对旋转差分的影响,通过与普通异或差分的比较... 针对SHA-3算法核心置换的旋转攻击,分析了SHA-3算法中编码环节对旋转性的影响,证明了在去掉常数的条件下SHA-3算法的置换能以概率为1保持旋转性;在保留常数的情况下研究了SHA-3算法中编码环节对旋转差分的影响,通过与普通异或差分的比较,说明常数对密码算法安全的至关重要性,证明了旋转差分可以以概率1通过该置换的线性编码环节,给出了该置换的一个4轮不能旋转差分。 展开更多
关键词 sha-3算法 置换 旋转攻击
在线阅读 下载PDF
SHA-3第三轮候选算法简评
17
作者 李梦东 杜飞 《北京电子科技学院学报》 2012年第2期39-42,共4页
SHA-3评选过程即将结束,本文对SHA-3第三轮的5个Hash函数候选算法进行了简要评述。对于各种算法的压缩函数、迭代结构以及安全性能等方面做了分析比较。通过这些比较,可深入理解这些算法的结构特点,掌握它们的安全性能。
关键词 HASH 函数 sha-3 迭代结构 压缩函数
在线阅读 下载PDF
Novel registration algorithm for 3-D images captured from multiple views of object surface
18
作者 衡伟 《Journal of Southeast University(English Edition)》 EI CAS 2005年第4期411-413,共3页
A novel algorithm of 3-D surface image registration is proposed. It makes use of the array information of 3-D points and takes vector/vertex-like features as the basis of the matching. That array information of 3-D po... A novel algorithm of 3-D surface image registration is proposed. It makes use of the array information of 3-D points and takes vector/vertex-like features as the basis of the matching. That array information of 3-D points can be easily obtained when capturing original 3-D images. The iterative least-mean-squared (LMS) algorithm is applied to optimizing adaptively the transformation matrix parameters. These can effectively improve the registration performance and hurry up the matching process. Experimental results show that it can reach a good subjective impression on aligned 3-D images. Although the algorithm focuses primarily on the human head model, it can also be used for other objects with small modifications. 展开更多
关键词 image alignment 3-D image 3-D capture image registration iterative least-mean-squared algorithm
在线阅读 下载PDF
基于SHA-3算法的图像密钥生成方法 被引量:1
19
作者 李建瑞 汪鹏君 +1 位作者 张跃军 李刚 《华东理工大学学报(自然科学版)》 CAS CSCD 北大核心 2015年第5期693-697,共5页
通过对新发布的Hash标准SHA-3算法和常规密码算法的研究,提出了一种新颖的密钥生成方案,该方案采用SHA-3算法与图像相结合的方法。首先,将图像处理成SHA-3算法能够吸收的数据形式,使其经过SHA-3算法的三维矩阵空间变换后生成密钥;其次,... 通过对新发布的Hash标准SHA-3算法和常规密码算法的研究,提出了一种新颖的密钥生成方案,该方案采用SHA-3算法与图像相结合的方法。首先,将图像处理成SHA-3算法能够吸收的数据形式,使其经过SHA-3算法的三维矩阵空间变换后生成密钥;其次,利用像素直方分布图将生成的密钥以图像形式显示,证明生成的密钥满足密码算法中对初始密钥以及密钥流的安全性要求;最后,利用VS2013以及Quartus II软件对所提方案加以实现,验证所生成的密钥随机性最小可达到97.7%,密钥空间最小可达到2224。 展开更多
关键词 sha-3算法 三维矩阵 图像加密 密钥生成
在线阅读 下载PDF
基于SHA-3的密文数据检索技术 被引量:1
20
作者 范雪峰 刘年义 +1 位作者 杨亚涛 李子臣 《计算机应用与软件》 CSCD 2015年第8期279-282,314,共5页
SHA-3算法的研究和应用已成为当前学术研究的热点。针对已有密文数据检索系统检索效率低的问题,在分析和研究已有密文数据检索技术的基础上,利用AES-128算法和SHA-3算法,设计和实现了基于SHA-3的密文数据检索系统。实验证明,该系统能够... SHA-3算法的研究和应用已成为当前学术研究的热点。针对已有密文数据检索系统检索效率低的问题,在分析和研究已有密文数据检索技术的基础上,利用AES-128算法和SHA-3算法,设计和实现了基于SHA-3的密文数据检索系统。实验证明,该系统能够实现数据库加密、密文精确检索和密文模糊检索,提高密文检索效率,保证数据库安全。二次检索模型和SHA-3算法的使用,使此系统的检索准确性和检索效率达到无索引明文检索的70%。 展开更多
关键词 数据库加密 密文数据检索 AES-128算法 sha-3算法 二次检索模型
在线阅读 下载PDF
上一页 1 2 36 下一页 到第
使用帮助 返回顶部