100字范文,内容丰富有趣,生活中的好帮手!
100字范文 > 分割攻击 divide-and-conquer attack英语短句 例句大全

分割攻击 divide-and-conquer attack英语短句 例句大全

时间:2020-04-18 21:32:10

相关推荐

分割攻击 divide-and-conquer attack英语短句 例句大全

分割攻击,divide-and-conquer attack

1)divide-and-conquer attack分割攻击

1.Adivide-and-conquer attack on the stream cipher which could decrease entropy of the key efficiently is proposed.利用该算法所产生的乱数序列具有前几个比特对密钥的低位比特变化不够敏感的性质,提出了能够有效降低该流密码算法密钥熵的分割攻击方法。

2.By analyzing the linear congruent algorithm on a prime field of CCPRSEA,it gains chaotic sequence and gives a tally-degree-baseddivide-and-conquer attack algorithm by using the information leak of the chaotic map itself.对复合混沌伪随机序列加密算法(CCPRSEA)做了深入分析,通过对该算法中素域上线性同余变换的分析,分离出混沌序列,利用混沌映射自身的信息泄漏规律,给出基于吻合度分布规律和函数中值定理的分割攻击方法,在base=10,m=3的情况下,证明了破译算法的成功率为0。

3.This paper analyzes the security of the chaos-based feedback cryptographic scheme of human video objects and gives adivide-and-conquer attack algorithm against it by using the incompleteness of which the key information diffuses in keystreams.对一个基于混沌反馈模型图像加密算法的安全性进行了分析,利用加密算法中密钥在乱数中扩散的不完全性,给出了一个分割攻击方法。

英文短句/例句

1.Divide-and-Conquer Attack on DLWX Chaotic Cipher Algorithm对DLWX混沌密码算法的分割攻击

2.Divide-and-Conquer Attack on Chaotic Spreading Sequences Generated by Extended Chaotic Map对广义映射混沌扩频序列的分割攻击

3.The bleed effect of“Lacerate” now increases in potency with greater attack power.割裂的流血效果受攻击强度的加成。

4.Operational effectiveness analysis of group airplanes attacking ground targets;攻击机编队的对地攻击作战效能分析

5.An Attacked-Probability-Based Approach to Ranking Attack Graph一种基于攻击概率的攻击图分级方法

6.the victim of a terrorist attack恐怖分子攻击的受害者

7.violently advattack,disagree,react violently攻击、反对、反应十分强烈

8.Attack classification research and taxonomy of vulnerabilities in high-speed networks攻击分类研究与高速网络环境下的攻击分类

9.Research on Attack Source Traceback in Distributed Denial-of-Service Attacks;分布式拒绝服务攻击中攻击源追踪的研究

10.Research on Network Attack Taxonomy and Network Attack System Model;网络攻击分类及网络攻击系统模型研究

11.Research of Network Attack Description System and Typical Attack Countermeasures;网络攻击分类描述与典型攻击对策研究

12.Research on IP Traceback Techniques in Distributed Denial-of-Service Attack分布式拒绝服务攻击的攻击源追踪技术研究

13.Analysis and Defense of Enhanced Attack Tree-Based Complex Attacks基于增强攻击树的复杂攻击分析与防御

14.To set upon with violent force.袭击,攻击以暴力攻击

15."Go up against the land of Merathaim, even against it, and against the people of Pekod; put them to death and send destruction after them, says the Lord, and do everything I have given you orders to do."耶和华说,上去攻击米拉大翁之地,又攻击比割的居民。要追杀灭尽,照我一切所吩咐你的去行。

16.repel an attack [the assailants]击退进攻[进攻者]

17."In those days the Lord was angry first with Israel; and Hazael made attacks on all the land of Israel,"在那些日子,耶和华才割裂以色列国,使哈薛攻击以色列的境界,

18.Thrust was followed by counter-thrust;攻击紧跟着反攻击;

相关短句/例句

improved divide and conquer attack优化的分割攻击

3)differential attack差分攻击

1.The improvement of 6 round and 8 round DES ofdifferential attack and its implement;6圈和8圈DES的差分攻击改进及实现

2.Experimental results show that the improved algorithm has stronger ability to resistdifferential attack,and the avalanche effect of .实验结果表明,改进后的算法对差分攻击的抵抗能力有所提高,雪崩效应更趋合理。

3.Some kinds of the precaution for protecting the Rijndael algorithm against thedifferential attack is proposed.本文探讨了对Rijndael算法的各种攻击,介绍了一种对Rijndael算法差分攻击的JAVA实现,提出了几种防范对Rijndael算法差分攻击的方法。

4)attack classification攻击分类

1.A new detectionorientedattack classification approach——DetectClass, based on the data collected directly by the intrusion detection system (IDS), is proposed.提出一种面向检测的攻击分类方法——DetectClass方法,进行形式化的分析和证明,进而提出相应的攻击树生成算法。

2.A newattack classification method was put forward and delivered the criterion and results of the classification.提出了一种新的基于多维角度的攻击分类方法,给出分类的标准和结果。

3.In order to overcome the disadvantages that IDS evaluation need a great deal of handwork,on account with anattack classification based on connection,APC Class,this paper puts forward an adaptative test model that facilitate simulating attack.针对现有IDS测试需大量手工操作的不足,提出一个以APC(地址信息A、协议状态P、连接状态C)攻击分类方法为依据的自适应测试模型。

5)attack analysis攻击分析

1.Based on the description of the algorithm, experimental results andattack analysis are g.在描述算法的基础上,给出了实验结果及攻击分析。

2.Based on the description of the algorithm, experimental results andattack analysis are given.在描述算法的基础上 ,给出了实验结果及攻击分析 。

6)Distinguishing attack区分攻击

1.Improved distinguishing attack on Py;对Py的一种改进的区分攻击

2.In this paper,the authors improve the lower bound of the linear complexity of the balanced shrinking sequences,and analyze the security of the generator with correlation attack and distinguishing attack.改进了平衡收缩序列线性复杂度的下界,并从相关攻击和区分攻击的角度对平衡收缩生成器的安全性进行了分析,认为平衡收缩序列依然不能抵抗相关攻击和区分攻击。

3.A distinguishing attack on this structure is presented.对新提议的一种基于线性反馈移位寄存器、非线性反馈移位寄存器和过滤布尔函数的序列密码结构的安全性进行了研究,对这种结构给出了一种区分攻击。

延伸阅读

Dedekind分割Dedekind分割Dedekind cutD日加脑目分割[D汕如目cut;皿e八eKou皿。即ee,e。。e],分割(cut)把实数集R(或有理数集Q)分割成两个非空集合A和B,其并为R(或Q),并使得对任何a6A和be及都有a

本内容不代表本网观点和政治立场,如有侵犯你的权益请联系我们处理。
网友评论
网友评论仅供其表达个人看法,并不表明网站立场。