说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 分片攻击
1)  fragment attack
分片攻击
2)  differential attack
差分攻击
1.
The improvement of 6 round and 8 round DES of differential attack and its implement;
6圈和8圈DES的差分攻击改进及实现
2.
Experimental results show that the improved algorithm has stronger ability to resist differential attack,and the avalanche effect of .
实验结果表明,改进后的算法对差分攻击的抵抗能力有所提高,雪崩效应更趋合理。
3.
Some kinds of the precaution for protecting the Rijndael algorithm against the differential attack is proposed.
本文探讨了对Rijndael算法的各种攻击,介绍了一种对Rijndael算法差分攻击的JAVA实现,提出了几种防范对Rijndael算法差分攻击的方法。
3)  attack classification
攻击分类
1.
A new detectionoriented attack classification approach——DetectClass, based on the data collected directly by the intrusion detection system (IDS), is proposed.
提出一种面向检测的攻击分类方法——DetectClass方法,进行形式化的分析和证明,进而提出相应的攻击树生成算法。
2.
A new attack classification method was put forward and delivered the criterion and results of the classification.
提出了一种新的基于多维角度的攻击分类方法,给出分类的标准和结果。
3.
In order to overcome the disadvantages that IDS evaluation need a great deal of handwork,on account with an attack classification based on connection,APC Class,this paper puts forward an adaptative test model that facilitate simulating attack.
针对现有IDS测试需大量手工操作的不足,提出一个以APC(地址信息A、协议状态P、连接状态C)攻击分类方法为依据的自适应测试模型。
4)  divide-and-conquer attack
分割攻击
1.
A divide-and-conquer attack on the stream cipher which could decrease entropy of the key efficiently is proposed.
利用该算法所产生的乱数序列具有前几个比特对密钥的低位比特变化不够敏感的性质,提出了能够有效降低该流密码算法密钥熵的分割攻击方法。
2.
By analyzing the linear congruent algorithm on a prime field of CCPRSEA,it gains chaotic sequence and gives a tally-degree-based divide-and-conquer attack algorithm by using the information leak of the chaotic map itself.
对复合混沌伪随机序列加密算法(CCPRSEA)做了深入分析,通过对该算法中素域上线性同余变换的分析,分离出混沌序列,利用混沌映射自身的信息泄漏规律,给出基于吻合度分布规律和函数中值定理的分割攻击方法,在base=10,m=3的情况下,证明了破译算法的成功率为0。
3.
This paper analyzes the security of the chaos-based feedback cryptographic scheme of human video objects and gives a divide-and-conquer attack algorithm against it by using the incompleteness of which the key information diffuses in keystreams.
对一个基于混沌反馈模型图像加密算法的安全性进行了分析,利用加密算法中密钥在乱数中扩散的不完全性,给出了一个分割攻击方法。
5)  attack analysis
攻击分析
1.
Based on the description of the algorithm, experimental results and attack analysis are g.
在描述算法的基础上,给出了实验结果及攻击分析。
2.
Based on the description of the algorithm, experimental results and attack analysis are given.
在描述算法的基础上 ,给出了实验结果及攻击分析 。
6)  Distinguishing attack
区分攻击
1.
Improved distinguishing attack on Py;
对Py的一种改进的区分攻击
2.
In this paper,the authors improve the lower bound of the linear complexity of the balanced shrinking sequences,and analyze the security of the generator with correlation attack and distinguishing attack.
改进了平衡收缩序列线性复杂度的下界,并从相关攻击和区分攻击的角度对平衡收缩生成器的安全性进行了分析,认为平衡收缩序列依然不能抵抗相关攻击和区分攻击。
3.
A distinguishing attack on this structure is presented.
对新提议的一种基于线性反馈移位寄存器、非线性反馈移位寄存器和过滤布尔函数的序列密码结构的安全性进行了研究,对这种结构给出了一种区分攻击。
补充资料:分片包干
1.划出范围,负责完成任务。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条