该算法显著地降低了快速相关攻击算法的译码复杂度。
The new algorithm notably reduces the decoding complexity of the fast correlation attack algorithm.
给出了应用该算法的具体步骤,并分析了攻击算法的计算复杂性。
The concrete step and complexity of the attack algorithm is given.
给出了应用该算法的具体步骤,并分析了攻击算法的计算复杂性。
Researches on the Algorithm and Software of the Complexity Analysis of Electrical Noise;
门限的计算降低了快速相关攻击算法的计算复杂度,扩大了算法的应用范围。
Computation of thresholds decreases the computing complexity of fast correlation attack, and extends the application of algorithms.
不幸的是,这个哈希函数不是非常安全,它可以通过字典攻击算法被破解类似命令行应用程序!
Unfortunately, this is not a very secure hash function, it can be a dictionary attack to break algorithm similar to the command-line application!
寻找对尽可能多的攻击算法有免疫性的半色调图像的数字水印方法将持续成为研究的主要方向之一。
It would be one of the unremitting research works to seek watermarking methods for halftoned images that could resist as many attack algorithms as possible.
在分析基于卷积码的快速相关攻击算法时,提出了快速排序匹配索引算法,用以寻找重量较小的一致校验方程。
This paper describes a new method of fast arranging and matching and indexing for fast correlation attacks based on convolutional codes.
分析了JPEG图像的信息隐藏方法及各种攻击算法,提出了一种新的基于支持向量机(SVM)的盲检测算法。
After introducing some information hiding methods and steganalysis techniques for JPEG images, this paper proposes a new SVM-based blind steganalysis algorithm for JPEG images.
基于MIX匿名系统模型,提出一种改进的统计命中集攻击算法,并在该算法的基础上给出基于填充包的防御策略。
This paper proposes an improved Statistical Hitting Set attack (SHS-attack) based on MIX anonymity technique and a defence strategy based on dummy packets to counter against this attack.
要实现攻击,攻击者需要先从使用MD 5算法签署证书的CA购买若干ssl证书。
To make an attack, the attacker needs to buy several SSL certificates from CAs who sign certificates with the MD5 algorithm.
这种攻击并不意味着整个互联网或者SSL安全已经被突破,但的确意味着厂商应该不再用MD 5作为签名算法。
This attack doesn't mean that all Internet or SSL security has been compromised, but it does mean vendors should move away from using the MD5 signing algorithm.
为算法名签名以抵抗攻击,该攻击是基于置换成效率更低的算法。
The algorithm names are signed to resist attacks based on the substitution of a weaker algorithm.
使用这些校验和算法中的一种可以将程序遭受意外破坏的机率降低到少于十亿分之一(尽管故意攻击仍有可能)。
Using one of these checksum algorithms reduces the chance of accidental corruption to less than one in a billion (though deliberate attacks are still a possibility, as you'll see).
实验结果表明该算法对JPEG压缩、随机噪声攻击、剪切及加噪等具有较高的鲁棒性。
Experiment results show that this algorithm has better robustness in JPEG compression, random noising attacks, cutting and noise adding.
因此,有必要采用一种加密强度比较高的加密算法来加密一些重要数据,以防止合法用户的越权操作和非法用户的恶意攻击。
So it is necessary to adopt one encrypt intensity high algorithm encrypt some important data, in order to prevent that legal users operate over authority, illegal user attack viciously.
实验表明,该算法能够很好地抵抗局部剪切的攻击。
Experimental results show that, this algorithm is able to resist local cropping attack.
图像水印的算法设计和攻击技术是互相促进的对立面。
The image watermarking algorithm design and the attack way are opposite to and promotional of each other.
实验表明,该算法对于噪声、旋转、缩放和JPEG压缩等常见攻击有良好的鲁棒性。
Experiment shows that the algorithm is resist in common watermarking attacks suck as noise, rotate, resize and JPEG compression.
实验结果证明,基于块奇异值分解的水印算法对常规的图像处理攻击具有很好的鲁棒性,尤其是其中的量化水印算法。
The experiment results show that watermarking algorithms based on block SVD are very robust to usual image manipulation attacks, especially the quantization watermarking algorithm.
模拟实验表明TVCA算法在提高计算效率、抵抗恶意攻击等方面都能取得良好的效果。
The experimental results show that TVCA can achieve good effects in many aspects such as efficient computing and malicious attack resistance.
同时,在借鉴国内外研究成果的基础上,探讨了攻击路径的自动生成算法以及对攻击图相关的算法之间的优缺点进行了比较。
It has profited from the domestic and foreign research results, in this foundation, it discussed automatic production of attack path, as well as attack graph algorithm comparison.
在KDDCUP99数据集中进行了对比仿真实验,实验结果表明算法对已知攻击和未知攻击的检测率以及算法的误警率都是理想的。
The simulations on the KDD CUP99 dataset show that the detection rate of known attacks and unknown attacks and the false positive rate of this algorithm are excellent.
此算法实现简单,而且此算法在抵抗剪切压缩噪声等攻击都具有很好的鲁棒性。
This scheme carries out easily and it has very good robustness when it is attacked by cut, noise and compression.
此算法实现简单,而且此算法在抵抗剪切压缩噪声等攻击都具有很好的鲁棒性。
This scheme carries out easily and it has very good robustness when it is attacked by cut, noise and compression.
应用推荐