ID 原文 译文
23375 对基于矩阵求逆计算和基于遗传算法的两种解耦标定方法进行了对比实验,实验结果表明,基于遗传算法的 3 维电场传感器解耦标定方法与传统标定方法相比,有效地消除了电场分量对传感器的耦合干扰,提高了标定精度,实现了 3 维电场的准确测量。 Experiments are conducted to verify the decoupling calibration methods based on the matrix inversion technology and GA. The experimental results show that the proposed method can effectively eliminate coupling interferences, improve the calibration precision and realize accurate measurements.
23376 为了保证异构网络中消息的机密性和认证性,该文定义了身份公钥密码 IDPKC 到无证书公钥密码 CLPKC异构签密模型,并提出具体的 IDPKC-to-CLPKC 异构签密方案。方案中双方密码系统参数相互独立,能够满足实际应用需求。 In order to ensure the confidentiality and authentication in different network environments, the security model of IDPKC-to-CLPKC heterogeneous signcryption is defined from IDentity-based Public Key Cryptography (IDPKC) to CertificateLess Public Key Cryptography (CLPKC), and a concrete IDPKC-to-CLPKC heterogeneous signcryption scheme is presented. The system parameters in IDPKC and CLPKC are independent on each other in the scheme, which can meet the practical requirements.
23377 在随机预言模型下,基于 GBDH, CDH q-SDH 困难假设,证明方案满足 IDPKC-to-CLPKC 异构签密的机密性和不可伪造性。 Based on the assumptions of Gap Bilinear Diffie-Hellman (GBDH), Computational Diffie-Hellman (CDH) and q-Strong Diffie-Hellman (q-SDH), the scheme is proved to satisfy the confidentiality and unforgeability in the random oracle model.
23378 同时,该方案满足匿名性,通过密文无法判断发送方和接收方的身份,可以有效保护双方的身份隐私。 Moreover, the scheme is also proved to satisfy the properties of ciphertext anonymity, which means the attacker can not judge the identities of the sender and the receiver. Therefore, the scheme can effectively protect the privacy of both identities.
23379 针对面向字级优化的通用处理器,在应对密码算法中大位宽比特置换操作时效率较低的问题,该文提出2N-2N kN-kN(2k >)的大位宽比特置换操作高速实现方案。并针对方案中涉及的比特提取和比特提取-移位两种操作,分别提出专用扩展指令 BEX, BEX-ROT。 Wide-width bit permutation is a very commonly used operation in symmetric cryptographic algorithms. However, current word-oriented general microprocessors are inefficient to cope with the complex bit-level permutation operations. To solve this problem, two schemes for 2N-2N and kN-kN permutations are proposed respectively, including two extended instructions BEX and BEX-ROT.
23380 在此基础上,对专用指令硬件架构的高效设计进行研究,提出一种基于 Inverse Butterfly 网络统一硬件架构-RERS(Reconfigurable Extract and Rotation Shifter)及相应可重构路由算法,以最大限度地共享硬件资源,减小电路面积。 Furthermore, the efficient hardware implementation of the instructions are studied, and then a unified hardware circuit named RERS (Reconfigurable Extract and Rotation Shifter) is proposed with a corresponding reconfigurable routing algorithm. The RERS can share hardware resources to achieve the purpose of reducing area.
23381 实验结果表明,所提方案能够将处理器架构执行大位宽比特置换操作的指令条数缩减约 10 倍,大幅提升其处理效率。 The experimental results show that the proposed schemes can truly decrease the number of instructions for accomplishing an arbitrary wide-width bit permutation (instructions reduced by 10 times), which greatly accelerate the performance of microprocessors.
23382 同时,由专用指令所带来的硬件资源开销和延迟开销均较低,不会影响到原架构正常工作频率。 At the same time, the overhead of hardware resources and delay caused by the two extended instructions is very low, which will not affect the normal operating frequency of the original microprocessors.
23383 多径效应或多输入多输出(MIMO)雷达发射波形不完全正交的情况下会引入干扰,此种干扰通常被称为目标引入干扰。 In radar system, the target-induced interference often arises due to multipath effect or non-ideal transmit waveform of Multiple-Input Multiple-Output (MIMO) radar.
23384 针对存在目标引入干扰的目标检测问题,该文基于 Wald 准则提出适用于均匀环境和非均匀环境下的自适应检测器,所提出的检测器可有效抑制目标引入的干扰,且具有恒虚警率(CFAR)特性。 For the issue of detecting a target with target-induced interference, the detectors are proposed based on the design criterion of Wald test both in the homogeneous environment and partially homogeneous environment. The proposed detectors are proved to be effective for suppressing the target-induced interference and they can ensure the desirable Constant False Alarm Rate (CFAR) property with respect to the unknown parameters of the noise.