期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Overall Planning of Public Power and Expression of Private Rights in Cross-regional Trading of Construction Land Quotas
1
作者 Hong Yun 《Contemporary Social Sciences》 2021年第3期45-56,共12页
In China, the trading of construction land quotas has undergone an institutional evolution process characterized by gradual deregulation.In 2021, the Central Committee of the Communist Party of China(CPC) resolved to ... In China, the trading of construction land quotas has undergone an institutional evolution process characterized by gradual deregulation.In 2021, the Central Committee of the Communist Party of China(CPC) resolved to develop a national cross-regional trading mechanism for construction land quotas.Construction land quotas, which have attributes of both public power and private rights, share certain common grounds with the rights of land development, dumping and carbon emission.To build a national trading market for construction land quotas, it is necessary to make clarifications and innovations in macro-level ideas, meso-level mechanisms, and micro-level designs. 展开更多
关键词 construction land quotas overall planning of public power expression of private rights
下载PDF
Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds
2
作者 Muhammad Akram Muhammad Waseem Iqbal +3 位作者 Syed Ashraf Ali Muhammad Usman Ashraf Khalid Alsubhi Hani Moaiteq Aljahdali 《Computers, Materials & Continua》 SCIE EI 2022年第9期6061-6077,共17页
In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext ot... In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless.This paper aims to improve the said limitations by designing of Triple key security algorithm(TKS)in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext.Each plaintext character is substituted by an alternative message.The mode of substitution is transformed cyclically which depends on the current position of the modified communication.Three keys are used in the encryption and decryption process on 8 or 16 rounds with the Exclusively-OR(XOR)of the 1st key.This study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the attack.By utilization of the TKS algorithm,the decryption is illustrated,and security is analyzed in detail with mathematical examples. 展开更多
关键词 Encryption DECRYPTION CIPHER symmetric key cryptography single key attack
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部