ID | 原文 | 译文 |
45876 | 设计一种基于工作流截止日期约束的代价驱动调度策略。 | Finally, a cost-driven strategy for the dead-line-constrained workflow was designed. |
45877 | 它充分考虑数据通信代价和任务计算代价的情况。 | It both considered the data transfer cost and the computing cost. |
45878 | 实验结果表明,ADPSOGA 在波动因素存在情况下,对工作流截止日期满足和执行代价控制方面具有良好的性能表现。 | Experimental results show that the ADPSOGA has better performance in terms of deadline and cost reducing in the fluctuant environment. |
45879 | 提出了对 SM3 散列函数 32 轮的原像攻击和 33 轮的伪碰撞攻击。 | A preimage attack on 32-step SM3 hash function and a pseudo-collision attack on 33-step SM3 hash function respectively were shown. |
45880 | 利用差分中间相遇攻击与 biclique 技术改进了对 SM3 的原像分析结果,将攻击结果从之前的 30 轮提高到了 32 轮。 | 32-step preimage attack was based on the differential meet-in-the-middle and biclique technique,while the previously known best preimage attack on SM3 was only 30-step. |
45881 | 基于上述方法,通过扩展 32 轮原像攻击中的差分路径,对 SM3 构造了 33 轮的伪碰撞攻击。 | The 33-step pseudo-collision attack was constructed by using the same techniques. |
45882 | 以 2 254.5 的时间复杂度与 2 5 的空间复杂度构造了对 SM3 的32 轮原像攻击, | The preimage attack on 32-step SM3 can be computed with a complexity of 2254.5, and a memory of 25. |
45883 | 并以 2 126.7 的时间复杂度与 2 3 的空间复杂度构造了对 SM3 的 33 轮伪碰撞攻击。 | Furthermore, The pseudo-preimage and pseudo-collision attacks on 33-step SM3 by extending the differential characteristic of the 32-step preimage attack were present. The pseudo-collision attack on 33-step SM3 can be computed with a complexity of 2126.7, and a memory of 2 3. |
45884 | 提出一种高效的群组协商通信协议,针对节点身份认证的效率问题, | An efficient communication protocol of group negotiation was proposed. |
45885 | 采用群内节点自检认证的方式,避免向认证中心发送认证证书,从而提高身份认证的速度; | The protocol adopted self-checking authentication in group to avoid the nodes sending certificates to the authentication center which improved the efficiency of identification. |