ID |
原文 |
译文 |
45876 |
设计一种基于工作流截止日期约束的代价驱动调度策略。 |
Finally, a cost-driven strategy for the dead-line-constrained workflow was designed. |
45877 |
它充分考虑数据通信代价和任务计算代价的情况。 |
It both considered the data transfer cost and the computing cost. |
45878 |
实验结果表明,ADPSOGA 在波动因素存在情况下,对工作流截止日期满足和执行代价控制方面具有良好的性能表现。 |
Experimental results show that the ADPSOGA has better performance in terms of deadline and cost reducing in the fluctuant environment. |
45879 |
提出了对 SM3 散列函数 32 轮的原像攻击和 33 轮的伪碰撞攻击。 |
A preimage attack on 32-step SM3 hash function and a pseudo-collision attack on 33-step SM3 hash function respectively were shown. |
45880 |
利用差分中间相遇攻击与 biclique 技术改进了对 SM3 的原像分析结果,将攻击结果从之前的 30 轮提高到了 32 轮。 |
32-step preimage attack was based on the differential meet-in-the-middle and biclique technique,while the previously known best preimage attack on SM3 was only 30-step. |
45881 |
基于上述方法,通过扩展 32 轮原像攻击中的差分路径,对 SM3 构造了 33 轮的伪碰撞攻击。 |
The 33-step pseudo-collision attack was constructed by using the same techniques. |
45882 |
以 2 254.5 的时间复杂度与 2 5 的空间复杂度构造了对 SM3 的32 轮原像攻击, |
The preimage attack on 32-step SM3 can be computed with a complexity of 2254.5, and a memory of 25. |
45883 |
并以 2 126.7 的时间复杂度与 2 3 的空间复杂度构造了对 SM3 的 33 轮伪碰撞攻击。 |
Furthermore, The pseudo-preimage and pseudo-collision attacks on 33-step SM3 by extending the differential characteristic of the 32-step preimage attack were present. The pseudo-collision attack on 33-step SM3 can be computed with a complexity of 2126.7, and a memory of 2 3. |
45884 |
提出一种高效的群组协商通信协议,针对节点身份认证的效率问题, |
An efficient communication protocol of group negotiation was proposed. |
45885 |
采用群内节点自检认证的方式,避免向认证中心发送认证证书,从而提高身份认证的速度; |
The protocol adopted self-checking authentication in group to avoid the nodes sending certificates to the authentication center which improved the efficiency of identification. |