ID |
原文 |
译文 |
46976 |
为保证 Data 分组能够成功原路返回,在单播路径构造中引入车辆动态参数作为构造依据并结合链路有效时间(LET, link expiration time)进行路径筛选,提高了转发路径的稳定性及可靠性; |
By introducing dynamic metrics andLET to routing building and selecting process, SRBS improved the link stability and reliability, which ensured the Data’ssuccessful return. |
46977 |
仿真表明该方案提高了路由对时间的容忍度,充分利用了网络缓存并减少了网络时延及路由跳数。 |
Simulation results show the scheme also improves the time tolerance of routings and makes full use ofnetwork cache and reduces delay and routing hops. |
46978 |
研究了相关密钥不可能飞来去器分析方法及轻量级分组密码算法 LBlock 在该分析方法下的安全性。 |
The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlockagainst this method were investigated. |
46979 |
将不可能飞来去器分析方法和相关密钥分析方法相结合,针对 22 轮 LBlock 给出了新的攻击。 |
A new attack on 22-round LBlock was presented combining impossible boomerangattacks with related-key attacks. |
46980 |
构造了 15 轮的相关密钥不可能飞来去器区分器,通过向前扩展 3 轮,向后扩展 4 轮,成功攻击了 22 轮 LBlock。 |
A 15-round related-key impossible boomerang distinguisher was constructed. Based onthe new distinguisher, an attack on 22-round LBlock was mounted successfully by concatenating 3-round to the begin-ning and 4-round to the end. |
46981 |
该攻击的数据复杂度仅为51.32 个明文,计算复杂度为71.542 次 22 轮加密。 |
The attack on 22-round LBlock required data complexity of only 51.32 plaintexts and com-putational complexity of about 71.542 22-round encryptions. |
46982 |
与已有结果相比,攻击的数据复杂度和计算复杂度均有明显下降。 |
Compared with published cryptanalysis results on 22-roundLBlock, proposed attack has great advantages on data and computational complexities. |
46983 |
为了促使计算能力薄弱的云租户有效及公平地重构秘密,结合云外包计算和秘密共享特性,提出一种云外包秘密共享方案。 |
In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness, acloud outsourcing secret sharing scheme was proposed, which combined cloud outsourcing computation with secretsharing scheme. |
46984 |
在云外包秘密共享过程中,云租户间无需交互,只需进行少量解密和验证操作,而将复杂耗时的秘密重构计算外包给云服务提供商。 |
In the process of outsourcing secret sharing, cloud tenants just need a small amount of decryption andvalidation operations, while outsource expensive cryptographic operations to cloud service provider (CSP). |
46985 |
该方案无需复杂的交互论证或零知识证明,能够及时发现云租户和云服务提供商的恶意行为, |
The scheme,without complex interactive augment or zero-knowledge proof, could detect malicious behaviors of cloud tenants or cloudservice providers. |