ID |
原文 |
译文 |
19925 |
该文针对已有研究未考虑具有高性能数据处理需求的服务链VNF部署问题,提出一种支持硬件加速的VNF部署模型。 |
To overcome the ignorance of the requirements for VNF with high processing throughput in service chain in existing researches, a model for VNF placement with hardware acceleration support is proposed. |
19926 |
该模型基于硬件加速资源的承载特性,在保证未加速VNF到商用服务器的优化部署下,优先实现交换机中加速资源的复用,并根据网络业务的性能需求,灵活调整加速资源与VNF的映射约束。 |
Based on the bearing characteristics of hardware acceleration resources, themodel prioritizes the reuse of acceleration resources in the switch under the optimal placement of VNF withoutacceleration to commercial servers. The mapping correlation between hardware acceleration resources and VNFis flexibly adjusted according to the requirements of network services. |
19927 |
仿真实验表明,与其他典型部署方法相比,在引入相同硬件加速资源的情况下,该模型可以承载更多的业务流量,满足服务链高性能数据处理需求,有效提高了部署在网络中加速硬件的资源利用率。 |
Simulation results show that the proposed model can bear more service flows and meet the high processing throughput needs of service chains than typical policies in the case of the same amount of resources, which improves effectively the resource utilization of the acceleration hardware deployed in the network. |
19928 |
LiCi是由Patil等人(2017)提出的轻量级分组密码算法。 |
LiCi algorithm is a newly lightweight block cipher. |
19929 |
由于采用新型的设计理念,该算法具有结构紧凑、能耗低、占用芯片面积小等优点,特别适用于资源受限的环境。 |
Due to its new design idea adopted by Patil et al, it has the advantages of compact design, low energy consumption and less chip area, thus is is especially suitable for resource-constrained environments. |
19930 |
目前该算法的安全性备受关注,Patil等人声称:16轮简化算法足以抵抗经典的差分攻击及线性攻击。 |
Currently, its security receives extensively attention, and Patilet al. claimed that the 16-round reduced LiCi can sufficiently resist both differential attack and linear attack. |
19931 |
该文基于S盒的差分特征,结合中间相遇思想,构造了一个10轮的不可能差分区分器。 |
In this paper, a new 10-round impossible differential distinguisher is constructed based on the differential characteristics of the S-box and the meet-in-the-middle technique. |
19932 |
基于此区分器,向前后各扩展3轮,并利用密钥编排方案,给出了LiCi的一个16轮的不可能差分分析方法。 |
Moreover, on the basis of this distinguisher, a 16-round impossible differential attack on LiCi is proposed by respectively extending 3-round forward and backward via the key scheduling scheme. |
19933 |
该攻击需要时间复杂度约为283.08次16轮加密,数据复杂度约为259.76选择明文,存储复杂度约为276.76数据块,这说明16轮简化的LiCi算法无法抵抗不可能差分攻击。 |
This attack requires a time complexity of about 283.08 16-round encryptions, a data complexity of about 259.76 chosen plain texts, and a memory complexity of 276.76 data blocks, which illustrates that the 16-round LiCi cipher can not resist impossible differential attack. |
19934 |
目前对分布式LT码(DLT)的研究仅限于信源数量较少、且只有1层中继的情况,该文提出一种能够部署在多层中继网络上的分布式LT码,即多层分布式LT码(MLDLT)。 |
Present researches on Distributed Luby’s Transmission (DLT) codes are restricted on several-sources and one-layer-relay networks, thus the Multiple Layers Distributed LT (MLDLT) code for multiple-layers-relays networks is proposed. |