1) timing attack
定时攻击
1.
Researching on timing attack at the accelerating implementation algorithm of RSA
加速RSA算法的定时攻击研究
2.
This thesis firstly introduces the basic theory of timing attack and the discription of the related algorithms, and then taking the modular exponentiations for example, emulates the attack process, finally analysises the advantages, several prob- lems waiting for further study and the trend of timing attack.
定时攻击是指攻击者试图通过分析执行加密算法所需要的时间,从而对加密系统进行的破解攻击。
2) impact time
攻击时间
1.
Therefore,it is important to control both impact time and impact angle for flight vehicle’s homing problem simultaneously.
在攻击无人机群协同攻击中,为了提高机群的整体突防能力,达到最佳的攻击和作战效能,有必要同时控制无人机的攻击角度和攻击时间。
2.
The virtual-leader is introduced,which would fly straightly to the target from the designated impact angle at the designated impact time.
构造一枚虚拟领弹按指定的攻击时间和攻击角度以直线飞向目标。
3) timing attack
计时攻击
1.
The most widely accepted defense against timing attacks is to perform RSA blinding,which has a performance penalty.
为了防御计时攻击,一般采用以"绑定法"为代表,影响运算性能的模幂算法。
2.
This paper describes the basic concept, principles, and history of timing attack, the readers can thus have a basic understanding of this area.
计时攻击是指攻击者通过分析执行加密算法所需要的时间,从而获取密钥信息的攻击方式。
3.
The most widely accepted defense against timing attacks is to perform RSA blinding,which has a performance penalty.
为了防御计时攻击,一般采用以“绑定法”为代表,影响运算性能的模幂算法。
4) timing attack
时间攻击
1.
A timing attack to rerouting-based anonymous communication was presented according to these problems.
本文分析了重路由匿名系统的抗攻击性问题,重点分析了一种针对重路由匿名通信系统的时间攻击方式。
2.
This paper,proposes a general anonymous communication model based on rerouting,and a timing attack model also has been presented according to this model.
时间攻击是指对手研究信息穿过系统的时间来找出信息发送者和接收者之间的相关性,对支持交互式的低延时匿名通信系统形成一种巨大威胁。
5) zero-day attack
瞬时攻击
1.
The current status of development in firewall technology and the active-defense thought in face of the zero-day attack has been analyzed and studied,as well as the active-defense in firewall system.
分析和研究了防火墙的技术发展现状以及面对瞬时攻击的主动防御思想,探讨了防火墙系统中主动防御。
2.
This paper analyzes and researches the evolution of firewall technology and active prevention against “Zero-day Attack”, and discusses the implement mechanism of Active Prevention’s Mechanism in Firewall System.
分析和研究了防火墙的技术发展现状以及面对瞬时攻击的主动防御思想,探讨了防火墙系统中主动防御的实现机制。
6) timing attacks
时间攻击
1.
Timing attacks aimed at a cryptosystem has caused great interest,but the vulnerability of elliptic curve crytptology to timing attacks has not been widely studied.
加密体制的时间攻击已经引起了人们的关注 ,而有关椭圆曲线加密算法ECC的时间攻击的研究相对较少 ,就在这方面作一下探讨。
2.
On the other hand,we study the ability of the generators to resist the timing attacks.
针对缩减类序列目前研究存在的主要问题,利用概率理论和时间攻击技术分析了输出率为1/r的缩减类生成器的存储空间,指出具有该输出率的缩减类型序列生成器的存储空间不能为空。
3.
Timing attacks aimed at a cryptosystem has been attracted great interest,but the vulnerability of Elliptic Curve Cryptology to timing attacks has not been widely studied.
加密体制的时间攻击已经引起了人们的关注,而有关椭圆曲线加密算法ECC的时攻击的研究相对较少,本文就在这方面作一下探讨。
补充资料:报定时不定
【报定时不定】
谓业力定故,报不可改,然时有可转,故时节不定,是名报定时不定。
谓业力定故,报不可改,然时有可转,故时节不定,是名报定时不定。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条