[HTML][HTML] 结合图像加密与深度学习的高容量图像隐写算法

杨晓元, 毕新亮, 刘佳, 黄思远 - 通信学报, 2021 - infocomm-journal.com
image steganography scheme based on deep learning will expose the secret image, a
high-capacity image steganography scheme combining image encryption and deep learning was …

[HTML][HTML] 詳目顯示

H MANDAL - ndltd.ncl.edu.tw
… The primary objective of the real-time reconfigurable hardware design of the quality access
control scheme is to serve miscellaneous intent ie low power consumption, high throughput, …

一些密碼元件之分析與設計

李鎮宇, 林祝興 - 2012 - ir.lib.nycu.edu.tw
… The method proposed in [57] dynamic group key management schemes with forward … based
on elliptic curve cryptosystem (ECC) [58], forming a self-certified public key cryptosystem [59]…

[PDF][PDF] 后量子加密算法的硬件实现综述

曹元, 陆旭, 吴彦泽, 谢浩东, 乔云凯, 姚恩义… - Journal of Cyber …, 2021 - jcs.iie.ac.cn
… of the NIST post-quantum cryptography algorithm solicitation (round 2 and 3), outlines
the current main implementation methods of post-quantum encryption algorithms: hash-based, …

具有資訊隱密性與容錯能力的分散式雲端儲存系統

林孝盈, 曾文貴 - 2009 - ir.lib.nycu.edu.tw
… Our key technique is combining a public key encryption scheme and a variant of random
linear code. As a … 1It can also be described as additive groups over points on an elliptic curve. …

[PDF][PDF] 矢量地理数据安全保护关键技术和方法

李虎, 朱恒华, 花卫华, 尚浩, 刘海涛, 李罡, 杨帆… - 地球科学, 2020 - earth-science.net
… , data watermarking, data scrambling, and information steganography, and discusses the …
is facing from the methods and integration of new technologies. Combining with the current …

[图书][B] 信息隐藏: 理论与技术

王育民 - 2006 - books.google.com
… Miller 独立地将椭圆曲线(elliptic curve) 引入密码学中, 成 为构造双钥密码体制的一个有力工具
. 利用有限域GF (2) 上的椭圆曲线上点集所构成 的群, 可以构造出基于有限域上的离散对数. 一些…

基于无证书签名的抗DNS 中间人攻击方案

胡杨, 韩增杰, 叶帼华, 姚志强 - 网络与信息安全学报, 2021 - infocomm-journal.com
… 密码学方案的安全性通常规约为数学困难问 题,利用困难问题的不可解来证明方案的安全性,
本文所涉及的数学困难问题是椭圆曲线下的离散 对数问题(ECDLP,elliptic curve discrete …

区块链环境下隐蔽信道研究综述.

张璇, 李雷孝, 杜金泽, 史建平 - Journal of Frontiers of …, 2024 - search.ebscohost.com
… 因此,可以用环签名和椭圆曲线数字 签名算法(elliptic curve digital signature algorithm, ECDSA…
A double steganography model combining blockchain and interplanetary file system [J]. Peer…