Among the four candidate algorithms in the fourth round of NIST standardization,the BIKE(Bit Flipping Key Encapsulation)scheme has a small key size and high efficiency,showing good prospects for application.However,th...Among the four candidate algorithms in the fourth round of NIST standardization,the BIKE(Bit Flipping Key Encapsulation)scheme has a small key size and high efficiency,showing good prospects for application.However,the BIKE scheme based on QC-MDPC(Quasi Cyclic Medium Density Parity Check)codes still faces challenges such as the GJS attack and weak key attacks targeting the decoding failure rate(DFR).This paper analyzes the BGF decoding algorithm of the BIKE scheme,revealing two deep factors that lead to DFR,and proposes a weak key optimization attack method for the BGF decoding algorithm based on these two factors.The proposed method constructs a new weak key set,and experiment results eventually indicate that,considering BIKE’s parameter set targeting 128-bit security,the average decryption failure rate is lowerly bounded by.This result not only highlights a significant vulnerability in the BIKE scheme but also provides valuable insights for future improvements in its design.By addressing these weaknesses,the robustness of QC-MDPC code-based cryptographic systems can be enhanced,paving the way for more secure post-quantum cryptographic solutions.展开更多
Folklore research entails field trips, serve as secondary role. Writing of title, abstract and while textual study and circumstantial investigation merely keywords for folklore papers differs from that of other types ...Folklore research entails field trips, serve as secondary role. Writing of title, abstract and while textual study and circumstantial investigation merely keywords for folklore papers differs from that of other types of articles. Proceeding from writing strategies and linguistic features, the authors intend to share their experience with fellow researchers.展开更多
The types and functions of social networking sites are becoming more abundant with the prevalence of self-media culture,and the number of daily active users of social networking sites represented by Weibo and Zhihu co...The types and functions of social networking sites are becoming more abundant with the prevalence of self-media culture,and the number of daily active users of social networking sites represented by Weibo and Zhihu continues to expand.There are key node users in social networks.Compared with ordinary users,their influence is greater,their radiation range is wider,and their information transmission capabilities are better.The key node users playimportant roles in public opinion monitoring and hot event prediction when evaluating the criticality of nodes in social networking sites.In order to solve the problems of incomplete evaluation factors,poor recognition rate and low accuracy of key nodes of social networking sites,this paper establishes a social networking site key node recognition algorithm(SNSKNIS)based on PageRank(PR)algorithm,and evaluates the importance of social networking site nodes in combination with the influence of nodes and the structure of nodes in social networks.This article takes the Sina Weibo platform as an example,uses the key node identification algorithm system of social networking sites to discover the key nodes in the social network,analyzes its importance in the social network,and displays it visually.展开更多
A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under diffe...A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under different conditions. Taking into account the factors of time, space and security integrated, this scheme possessed strong practicability. The paper also proposed a model of multi-degree parallel evolutionary algorithm to evaluate synthetically the efficiency and security of the public key cryptography. The model contributes to designing public key cryptography system too.展开更多
In the government work report for Two Sessions 2019, key words about E-commerce and internet were mentioned lots of times. This included terms such as Internet+, cross-border E-commerce,industrial internet, digital ec...In the government work report for Two Sessions 2019, key words about E-commerce and internet were mentioned lots of times. This included terms such as Internet+, cross-border E-commerce,industrial internet, digital economy,sharing economy, online and offline consumption, Internet+education and soon.Keywords No.1:Internet+Work Report:1. Internet+was advanced across the board and new technologies and models were used to transform traditional industries. 2. We will speed up efforts to pursue Internet+in all industries and sectors.展开更多
Aiming at the problem of video key frame extraction, a density peak clustering algorithm is proposed, which uses the HSV histogram to transform high-dimensional abstract video image data into quantifiable low-dimensio...Aiming at the problem of video key frame extraction, a density peak clustering algorithm is proposed, which uses the HSV histogram to transform high-dimensional abstract video image data into quantifiable low-dimensional data, and reduces the computational complexity while capturing image features. On this basis, the density peak clustering algorithm is used to cluster these low-dimensional data and find the cluster centers. Combining the clustering results, the final key frames are obtained. A large number of key frame extraction experiments for different types of videos show that the algorithm can extract different number of key frames by combining video content, overcome the shortcoming of traditional key frame extraction algorithm which can only extract a fixed number of key frames, and the extracted key frames can represent the main content of video accurately.展开更多
Titles、Abstracts and Key Words(1 th) Lu Guoyao A Brief Comment on "Documentary Linguistics"Abstract: Two thousand and five hundred years ago, Confucius attached great importance to "Document". We ...Titles、Abstracts and Key Words(1 th) Lu Guoyao A Brief Comment on "Documentary Linguistics"Abstract: Two thousand and five hundred years ago, Confucius attached great importance to "Document". We suggest that knowledge that regards both literature and oral material as the major resources should be respected. These knowledge interrelates and completes each other.展开更多
基金funded by Beijing Institute of Electronic Science and Technology Postgraduate Excellence Demonstration Course Project(20230002Z0452).
文摘Among the four candidate algorithms in the fourth round of NIST standardization,the BIKE(Bit Flipping Key Encapsulation)scheme has a small key size and high efficiency,showing good prospects for application.However,the BIKE scheme based on QC-MDPC(Quasi Cyclic Medium Density Parity Check)codes still faces challenges such as the GJS attack and weak key attacks targeting the decoding failure rate(DFR).This paper analyzes the BGF decoding algorithm of the BIKE scheme,revealing two deep factors that lead to DFR,and proposes a weak key optimization attack method for the BGF decoding algorithm based on these two factors.The proposed method constructs a new weak key set,and experiment results eventually indicate that,considering BIKE’s parameter set targeting 128-bit security,the average decryption failure rate is lowerly bounded by.This result not only highlights a significant vulnerability in the BIKE scheme but also provides valuable insights for future improvements in its design.By addressing these weaknesses,the robustness of QC-MDPC code-based cryptographic systems can be enhanced,paving the way for more secure post-quantum cryptographic solutions.
文摘Folklore research entails field trips, serve as secondary role. Writing of title, abstract and while textual study and circumstantial investigation merely keywords for folklore papers differs from that of other types of articles. Proceeding from writing strategies and linguistic features, the authors intend to share their experience with fellow researchers.
基金supported by Jiangsu Social Science Foundation Project(Grant No:20TQC005)Philosophy Social Science Research Project Fund of Jiangsu University(Grant No:2020SJA0500)+2 种基金The National Natural Science Foundation of China(GrantNo.61802155)The Innovation and Entrepreneurship Project Fund for College Students of Jiangsu Police Academy(Grant No.202110329028Y)The“qinglan Project”of Jiangsu Universities.
文摘The types and functions of social networking sites are becoming more abundant with the prevalence of self-media culture,and the number of daily active users of social networking sites represented by Weibo and Zhihu continues to expand.There are key node users in social networks.Compared with ordinary users,their influence is greater,their radiation range is wider,and their information transmission capabilities are better.The key node users playimportant roles in public opinion monitoring and hot event prediction when evaluating the criticality of nodes in social networking sites.In order to solve the problems of incomplete evaluation factors,poor recognition rate and low accuracy of key nodes of social networking sites,this paper establishes a social networking site key node recognition algorithm(SNSKNIS)based on PageRank(PR)algorithm,and evaluates the importance of social networking site nodes in combination with the influence of nodes and the structure of nodes in social networks.This article takes the Sina Weibo platform as an example,uses the key node identification algorithm system of social networking sites to discover the key nodes in the social network,analyzes its importance in the social network,and displays it visually.
基金Supported by the Hi-Tech Research and Development Program of China(2002AA1Z1490)
文摘A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under different conditions. Taking into account the factors of time, space and security integrated, this scheme possessed strong practicability. The paper also proposed a model of multi-degree parallel evolutionary algorithm to evaluate synthetically the efficiency and security of the public key cryptography. The model contributes to designing public key cryptography system too.
文摘In the government work report for Two Sessions 2019, key words about E-commerce and internet were mentioned lots of times. This included terms such as Internet+, cross-border E-commerce,industrial internet, digital economy,sharing economy, online and offline consumption, Internet+education and soon.Keywords No.1:Internet+Work Report:1. Internet+was advanced across the board and new technologies and models were used to transform traditional industries. 2. We will speed up efforts to pursue Internet+in all industries and sectors.
文摘Aiming at the problem of video key frame extraction, a density peak clustering algorithm is proposed, which uses the HSV histogram to transform high-dimensional abstract video image data into quantifiable low-dimensional data, and reduces the computational complexity while capturing image features. On this basis, the density peak clustering algorithm is used to cluster these low-dimensional data and find the cluster centers. Combining the clustering results, the final key frames are obtained. A large number of key frame extraction experiments for different types of videos show that the algorithm can extract different number of key frames by combining video content, overcome the shortcoming of traditional key frame extraction algorithm which can only extract a fixed number of key frames, and the extracted key frames can represent the main content of video accurately.
文摘Titles、Abstracts and Key Words(1 th) Lu Guoyao A Brief Comment on "Documentary Linguistics"Abstract: Two thousand and five hundred years ago, Confucius attached great importance to "Document". We suggest that knowledge that regards both literature and oral material as the major resources should be respected. These knowledge interrelates and completes each other.