说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> Square攻击
1)  Square attack
Square攻击
1.
The best-known attack against Rijndael is still the one presented by the designers called Square attack.
2000年10月Rijnael被选为高级加密标准(AES),目前对它最有效攻击仍是由设计者提出的Square攻击
2.
In virtue of these two concepts, a modified Square attack based on a nibble is designed to attack on the reduced Serpent of 3 rounds with 16 chosen plaintext ciphertext blocks and average 2127 inverse S box operations.
根据这些性质 ,并引进 Λ-集合和影响集的概念 ,得到了对于 3轮 Serpent加密算法实施 Square攻击的如下步骤 :1获取满足一定条件的 16个明文分组所对应的密文分组 ;2任意选取 12 8位的密钥 K3,并求其上述 16个密文分组的异或 ;3对所得到的 16个分组施行 S2 的逆变换 ;4求这 16个分组的按位异或 ,若为 0 ,则说明 2中所选取的 K3是正确的 ,否则返回 2 。
3.
Recently people presented Multiset attack which includes Square attack、Collision attack and Integral attack to attack block cipher with Square-like structure.
分组密码的设计与分析是目前信息安全领域中的热点问题,新出现的分组密码基本上都采用了结构非常清晰的SP网络结构,针对这种结构的分组密码,人们提出了Multiset攻击,包括Square攻击、碰撞攻击和积分攻击。
2)  Inverse square attack
逆序Square攻击
1.
In this paper we present a new kind of attack called inverse Square attack, which is a kind of chosen cipher text attack and better than Square attack.
本文提出的逆序Square攻击算法是一种选择密文攻击方法,对5、6轮的Rijndael密码的攻击优于Square攻击,对RD-256的攻击较原算法复杂度降低28。
3)  Aggression [英][ə'ɡreʃn]  [美][ə'grɛʃən]
攻击
1.
Relationship Between Rorschach Aggression Variables and Explicit Hostility;
罗夏测验攻击变量与外显攻击敌意的关系
2.
Rorschach Aggression Variables:A Study of Reliability and Validity;
罗夏测验攻击变量的信度效度研究
3.
Correlation between Personality and Rorschach Aggression Variables;
人格特征与罗夏测验攻击变量的相关性研究
4)  Attack [英][ə'tæk]  [美][ə'tæk]
攻击
1.
The prevention technology for ARP virus attack;
浅谈ARP病毒攻击的防御技术
2.
Prevention of attack on overflowing loopholes in buffer of Linux system;
对Linux系统缓冲区溢出漏洞攻击的防范
5)  attacking [英][ə'tæk]  [美][ə'tæk]
攻击
1.
This paper deeply analyses the principle and possiblility of buffer overflow attacking,and buffer overflow s potential dangers according to program code with buffer overflow.
针对C程序语言本身存在的不进行数组边界检查,容易产生缓冲区溢出,进而产生系统瘫痪等缺陷,对缓冲区溢出的原理和溢出攻击进行了详细的阐述。
2.
This paper briefly introduces the general outline of the Okamato E cash scheme and one attacking method against this scheme,discusses the attacking principles and provides some mends and reinforcements for the Okamato E cash schem
本文简要综述了电子货币的发展研究过程 ,分析了Okamoto电子货币体系的特点 ,剖析了一种攻击方法 ,对攻击方法做出了理论分析 ,在此基础上探讨了几种抵御攻击的方案 ,最后提出了一种改进的电子货币系
3.
This paper, based on the theory of IPv6, analyzes the security problem of IPv6 and a couple of classic attacking methods and briefly describes the research on information security.
论文从移动IPv6的基本原理入手,分析移动IPv6存在的安全隐患及几种典型的攻击方法,并对其安全性进行了简单的探讨。
6)  attacks [英][ə'tæk]  [美][ə'tæk]
攻击
1.
Attacks and Counterattacks of Digital Watermarking;
数字水印技术的攻击与反攻击研究
2.
Attacks on Robustness of Digital Watermarking and the Responding Remedies;
数字水印稳健性攻击及相应策略
3.
Discussion on ARP Loopholes and Defense ARP Attacks
ARP漏洞及其ARP攻击防范
补充资料:regression sum of square
分子式:
CAS号:

性质:反映自变量与因变量之间的相关程度的偏差平方和。用回归方程或回归线来描述变量之间的统计关系时,实验值yi与按回归线预测的值Yi并不一定完全一致,即各实验点(xi,yi)并不一定都落在回归线上,各实验点偏离回归线的程度,可用它们的总偏差平方和QT来表征,QT=∑(yi-Yi)2+∑(Yi-y)2,其中y是各实验值yi的平均值。Qg=∑(Yi-y)2称为回归平方和。Qg越大,自变量与因变量之间的相关性越好。

说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条