期刊文献+
共找到287,813篇文章
< 1 2 250 >
每页显示 20 50 100
基于RSA的访问数据匿名签名安全认证方法
1
作者 武伟 刘宏英 曲霄红 《现代电子技术》 北大核心 2026年第4期47-51,共5页
针对访问数据时,访问请求信息中包含个人或组织的敏感信息,且未加密的请求数据在认证传输过程中容易被第三方恶意修改或插入其他内容的问题,提出一种基于RSA的访问数据匿名签名安全认证方法。利用基于角色的访问控制机制,由基于RSA算法... 针对访问数据时,访问请求信息中包含个人或组织的敏感信息,且未加密的请求数据在认证传输过程中容易被第三方恶意修改或插入其他内容的问题,提出一种基于RSA的访问数据匿名签名安全认证方法。利用基于角色的访问控制机制,由基于RSA算法的访问请求信息加密方法对访问请求数据进行加密,并为访问系统中每个用户角色分配RSA密钥对,公钥共享给所有成员(管理员与用户);当用户申请访问数据时,采用基于环签名的匿名认证方法,使用多个成员的公钥生成环签名,以实现对访问请求的安全匿名认证。管理员使用公钥验证匿名签名,认证通过后解密访问请求数据并授权访问。测试结果表明:所提方法使用于某风电系统后,系统仅支持访问数据匿名签名安全认证合格的用户访问;且该方法具有高效率数据加解密能力,加密过程中素数位数为90 bit时,能保证系统的抗攻击能力更强。 展开更多
关键词 匿名签名 数据加密 rsa算法 安全认证 环签名 密钥设计
在线阅读 下载PDF
An Eulerian-Lagrangian parallel algorithm for simulation of particle-laden turbulent flows 被引量:1
2
作者 Harshal P.Mahamure Deekshith I.Poojary +1 位作者 Vagesh D.Narasimhamurthy Lihao Zhao 《Acta Mechanica Sinica》 2026年第1期15-34,共20页
This paper presents an Eulerian-Lagrangian algorithm for direct numerical simulation(DNS)of particle-laden flows.The algorithm is applicable to perform simulations of dilute suspensions of small inertial particles in ... This paper presents an Eulerian-Lagrangian algorithm for direct numerical simulation(DNS)of particle-laden flows.The algorithm is applicable to perform simulations of dilute suspensions of small inertial particles in turbulent carrier flow.The Eulerian framework numerically resolves turbulent carrier flow using a parallelized,finite-volume DNS solver on a staggered Cartesian grid.Particles are tracked using a point-particle method utilizing a Lagrangian particle tracking(LPT)algorithm.The proposed Eulerian-Lagrangian algorithm is validated using an inertial particle-laden turbulent channel flow for different Stokes number cases.The particle concentration profiles and higher-order statistics of the carrier and dispersed phases agree well with the benchmark results.We investigated the effect of fluid velocity interpolation and numerical integration schemes of particle tracking algorithms on particle dispersion statistics.The suitability of fluid velocity interpolation schemes for predicting the particle dispersion statistics is discussed in the framework of the particle tracking algorithm coupled to the finite-volume solver.In addition,we present parallelization strategies implemented in the algorithm and evaluate their parallel performance. 展开更多
关键词 DNS Eulerian-Lagrangian Particle tracking algorithm Point-particle Parallel software
原文传递
PID Steering Control Method of Agricultural Robot Based on Fusion of Particle Swarm Optimization and Genetic Algorithm
3
作者 ZHAO Longlian ZHANG Jiachuang +2 位作者 LI Mei DONG Zhicheng LI Junhui 《农业机械学报》 北大核心 2026年第1期358-367,共10页
Aiming to solve the steering instability and hysteresis of agricultural robots in the process of movement,a fusion PID control method of particle swarm optimization(PSO)and genetic algorithm(GA)was proposed.The fusion... Aiming to solve the steering instability and hysteresis of agricultural robots in the process of movement,a fusion PID control method of particle swarm optimization(PSO)and genetic algorithm(GA)was proposed.The fusion algorithm took advantage of the fast optimization ability of PSO to optimize the population screening link of GA.The Simulink simulation results showed that the convergence of the fitness function of the fusion algorithm was accelerated,the system response adjustment time was reduced,and the overshoot was almost zero.Then the algorithm was applied to the steering test of agricultural robot in various scenes.After modeling the steering system of agricultural robot,the steering test results in the unloaded suspended state showed that the PID control based on fusion algorithm reduced the rise time,response adjustment time and overshoot of the system,and improved the response speed and stability of the system,compared with the artificial trial and error PID control and the PID control based on GA.The actual road steering test results showed that the PID control response rise time based on the fusion algorithm was the shortest,about 4.43 s.When the target pulse number was set to 100,the actual mean value in the steady-state regulation stage was about 102.9,which was the closest to the target value among the three control methods,and the overshoot was reduced at the same time.The steering test results under various scene states showed that the PID control based on the proposed fusion algorithm had good anti-interference ability,it can adapt to the changes of environment and load and improve the performance of the control system.It was effective in the steering control of agricultural robot.This method can provide a reference for the precise steering control of other robots. 展开更多
关键词 agricultural robot steering PID control particle swarm optimization algorithm genetic algorithm
在线阅读 下载PDF
基于RSA同态加密的联邦学习隐私保护方案
4
作者 管桂林 蔡惠民 +4 位作者 支婷 曹扬 丁洪鑫 黄江 代杨 《电子科技》 2026年第2期96-104,共9页
针对现有联邦学习安全聚合方案存在梯度信息泄露、参与方计算开销较大以及缺乏对模型的完整性保护等问题,文中提出一种基于RSA(Rivest-Shamir-Adleman)同态加密的联邦学习隐私保护方案。采用构建高效且安全的RSA同态加密算法解决梯度数... 针对现有联邦学习安全聚合方案存在梯度信息泄露、参与方计算开销较大以及缺乏对模型的完整性保护等问题,文中提出一种基于RSA(Rivest-Shamir-Adleman)同态加密的联邦学习隐私保护方案。采用构建高效且安全的RSA同态加密算法解决梯度数据泄露问题,利用中央服务器实现解密计算以降低参与方的计算开销。基于区块链的不可篡改性、存证保护等特性将数据训练过程中关键数据进行上链存证,实现对模型数据的全生命周期维护。通过安全性分析可知,所提方案具有抗合谋攻击以及密文不可区分性。由性能以及效率方面分析对比结果可知,所提方案较传统方案具有一定优势。 展开更多
关键词 联邦学习 隐私保护 同态加密 区块链 rsa 安全聚合 存证保护 密文不可去分性
在线阅读 下载PDF
Optimization of Truss Structures Using Nature-Inspired Algorithms with Frequency and Stress Constraints
5
作者 Sanjog Chhetri Sapkota Liborio Cavaleri +3 位作者 Ajaya Khatri Siddhi Pandey Satish Paudel Panagiotis G.Asteris 《Computer Modeling in Engineering & Sciences》 2026年第1期436-464,共29页
Optimization is the key to obtaining efficient utilization of resources in structural design.Due to the complex nature of truss systems,this study presents a method based on metaheuristic modelling that minimises stru... Optimization is the key to obtaining efficient utilization of resources in structural design.Due to the complex nature of truss systems,this study presents a method based on metaheuristic modelling that minimises structural weight under stress and frequency constraints.Two new algorithms,the Red Kite Optimization Algorithm(ROA)and Secretary Bird Optimization Algorithm(SBOA),are utilized on five benchmark trusses with 10,18,37,72,and 200-bar trusses.Both algorithms are evaluated against benchmarks in the literature.The results indicate that SBOA always reaches a lighter optimal.Designs with reducing structural weight ranging from 0.02%to 0.15%compared to ROA,and up to 6%–8%as compared to conventional algorithms.In addition,SBOA can achieve 15%–20%faster convergence speed and 10%–18%reduction in computational time with a smaller standard deviation over independent runs,which demonstrates its robustness and reliability.It is indicated that the adaptive exploration mechanism of SBOA,especially its Levy flight–based search strategy,can obviously improve optimization performance for low-and high-dimensional trusses.The research has implications in the context of promoting bio-inspired optimization techniques by demonstrating the viability of SBOA,a reliable model for large-scale structural design that provides significant enhancements in performance and convergence behavior. 展开更多
关键词 OPTIMIZATION truss structures nature-inspired algorithms meta-heuristic algorithms red kite opti-mization algorithm secretary bird optimization algorithm
在线阅读 下载PDF
基于改进RSA算法的计算机网络数据安全共享方法研究
6
作者 陈亚伟 洪琼 《微型计算机》 2026年第6期1-3,共3页
文章给出一种改良的RSA算法,经由改良素数生成方法,采用动态密钥分散因子并改良模幂运算,改良后的RSA算法极大提升了密钥生成效率和加解密速度,实验结果表明,2048位密钥长度时,改良算法密钥生成时间缩短42%,加解密速度提升37%,且能防范... 文章给出一种改良的RSA算法,经由改良素数生成方法,采用动态密钥分散因子并改良模幂运算,改良后的RSA算法极大提升了密钥生成效率和加解密速度,实验结果表明,2048位密钥长度时,改良算法密钥生成时间缩短42%,加解密速度提升37%,且能防范中间人攻击和侧信道攻击。此外,在共享用电、区块链数据共享等情形也体现了其安全性和实用性。 展开更多
关键词 rsa算法改进 数据安全共享 运算优化
在线阅读 下载PDF
Flood predictions from metrics to classes by multiple machine learning algorithms coupling with clustering-deduced membership degree
7
作者 ZHAI Xiaoyan ZHANG Yongyong +5 位作者 XIA Jun ZHANG Yongqiang TANG Qiuhong SHAO Quanxi CHEN Junxu ZHANG Fan 《Journal of Geographical Sciences》 2026年第1期149-176,共28页
Accurate prediction of flood events is important for flood control and risk management.Machine learning techniques contributed greatly to advances in flood predictions,and existing studies mainly focused on predicting... Accurate prediction of flood events is important for flood control and risk management.Machine learning techniques contributed greatly to advances in flood predictions,and existing studies mainly focused on predicting flood resource variables using single or hybrid machine learning techniques.However,class-based flood predictions have rarely been investigated,which can aid in quickly diagnosing comprehensive flood characteristics and proposing targeted management strategies.This study proposed a prediction approach of flood regime metrics and event classes coupling machine learning algorithms with clustering-deduced membership degrees.Five algorithms were adopted for this exploration.Results showed that the class membership degrees accurately determined event classes with class hit rates up to 100%,compared with the four classes clustered from nine regime metrics.The nonlinear algorithms(Multiple Linear Regression,Random Forest,and least squares-Support Vector Machine)outperformed the linear techniques(Multiple Linear Regression and Stepwise Regression)in predicting flood regime metrics.The proposed approach well predicted flood event classes with average class hit rates of 66.0%-85.4%and 47.2%-76.0%in calibration and validation periods,respectively,particularly for the slow and late flood events.The predictive capability of the proposed prediction approach for flood regime metrics and classes was considerably stronger than that of hydrological modeling approach. 展开更多
关键词 flood regime metrics class prediction machine learning algorithms hydrological model
原文传递
Conditional Generative Adversarial Network-Based Travel Route Recommendation
8
作者 Sunbin Shin Luong Vuong Nguyen +3 位作者 Grzegorz J.Nalepa Paulo Novais Xuan Hau Pham Jason J.Jung 《Computers, Materials & Continua》 2026年第1期1178-1217,共40页
Recommending personalized travel routes from sparse,implicit feedback poses a significant challenge,as conventional systems often struggle with information overload and fail to capture the complex,sequential nature of... Recommending personalized travel routes from sparse,implicit feedback poses a significant challenge,as conventional systems often struggle with information overload and fail to capture the complex,sequential nature of user preferences.To address this,we propose a Conditional Generative Adversarial Network(CGAN)that generates diverse and highly relevant itineraries.Our approach begins by constructing a conditional vector that encapsulates a user’s profile.This vector uniquely fuses embeddings from a Heterogeneous Information Network(HIN)to model complex user-place-route relationships,a Recurrent Neural Network(RNN)to capture sequential path dynamics,and Neural Collaborative Filtering(NCF)to incorporate collaborative signals from the wider user base.This comprehensive condition,further enhanced with features representing user interaction confidence and uncertainty,steers a CGAN stabilized by spectral normalization to generate high-fidelity latent route representations,effectively mitigating the data sparsity problem.Recommendations are then formulated using an Anchor-and-Expand algorithm,which selects relevant starting Points of Interest(POI)based on user history,then expands routes through latent similarity matching and geographic coherence optimization,culminating in Traveling Salesman Problem(TSP)-based route optimization for practical travel distances.Experiments on a real-world check-in dataset validate our model’s unique generative capability,achieving F1 scores ranging from 0.163 to 0.305,and near-zero pairs−F1 scores between 0.002 and 0.022.These results confirm the model’s success in generating novel travel routes by recommending new locations and sequences rather than replicating users’past itineraries.This work provides a robust solution for personalized travel planning,capable of generating novel and compelling routes for both new and existing users by learning from collective travel intelligence. 展开更多
关键词 Travel route recommendation conditional generative adversarial network heterogeneous information network anchor-and-expand algorithm
在线阅读 下载PDF
GSLDWOA: A Feature Selection Algorithm for Intrusion Detection Systems in IIoT
9
作者 Wanwei Huang Huicong Yu +3 位作者 Jiawei Ren Kun Wang Yanbu Guo Lifeng Jin 《Computers, Materials & Continua》 2026年第1期2006-2029,共24页
Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from... Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from effectively extracting features while maintaining detection accuracy.This paper proposes an industrial Internet ofThings intrusion detection feature selection algorithm based on an improved whale optimization algorithm(GSLDWOA).The aim is to address the problems that feature selection algorithms under high-dimensional data are prone to,such as local optimality,long detection time,and reduced accuracy.First,the initial population’s diversity is increased using the Gaussian Mutation mechanism.Then,Non-linear Shrinking Factor balances global exploration and local development,avoiding premature convergence.Lastly,Variable-step Levy Flight operator and Dynamic Differential Evolution strategy are introduced to improve the algorithm’s search efficiency and convergence accuracy in highdimensional feature space.Experiments on the NSL-KDD and WUSTL-IIoT-2021 datasets demonstrate that the feature subset selected by GSLDWOA significantly improves detection performance.Compared to the traditional WOA algorithm,the detection rate and F1-score increased by 3.68%and 4.12%.On the WUSTL-IIoT-2021 dataset,accuracy,recall,and F1-score all exceed 99.9%. 展开更多
关键词 Industrial Internet of Things intrusion detection system feature selection whale optimization algorithm Gaussian mutation
在线阅读 下载PDF
Algorithmically Enhanced Data-Driven Prediction of Shear Strength for Concrete-Filled Steel Tubes
10
作者 Shengkang Zhang Yong Jin +5 位作者 Soon Poh Yap Haoyun Fan Shiyuan Li Ahmed El-Shafie Zainah Ibrahim Amr El-Dieb 《Computer Modeling in Engineering & Sciences》 2026年第1期374-398,共25页
Concrete-filled steel tubes(CFST)are widely utilized in civil engineering due to their superior load-bearing capacity,ductility,and seismic resistance.However,existing design codes,such as AISC and Eurocode 4,tend to ... Concrete-filled steel tubes(CFST)are widely utilized in civil engineering due to their superior load-bearing capacity,ductility,and seismic resistance.However,existing design codes,such as AISC and Eurocode 4,tend to be excessively conservative as they fail to account for the composite action between the steel tube and the concrete core.To address this limitation,this study proposes a hybrid model that integrates XGBoost with the Pied Kingfisher Optimizer(PKO),a nature-inspired algorithm,to enhance the accuracy of shear strength prediction for CFST columns.Additionally,quantile regression is employed to construct prediction intervals for the ultimate shear force,while the Asymmetric Squared Error Loss(ASEL)function is incorporated to mitigate overestimation errors.The computational results demonstrate that the PKO-XGBoost model delivers superior predictive accuracy,achieving a Mean Absolute Percentage Error(MAPE)of 4.431%and R2 of 0.9925 on the test set.Furthermore,the ASEL-PKO-XGBoost model substantially reduces overestimation errors to 28.26%,with negligible impact on predictive performance.Additionally,based on the Genetic Algorithm(GA)and existing equation models,a strength equation model is developed,achieving markedly higher accuracy than existing models(R^(2)=0.934).Lastly,web-based Graphical User Interfaces(GUIs)were developed to enable real-time prediction. 展开更多
关键词 Asymmetric squared error loss genetic algorithm machine learning pied kingfisher optimizer quantile regression
在线阅读 下载PDF
MCPSFOA:Multi-Strategy Enhanced Crested Porcupine-Starfish Optimization Algorithm for Global Optimization and Engineering Design
11
作者 Hao Chen Tong Xu +2 位作者 Yutian Huang Dabo Xin Changting Zhong 《Computer Modeling in Engineering & Sciences》 2026年第1期494-545,共52页
Optimization problems are prevalent in various fields of science and engineering,with several real-world applications characterized by high dimensionality and complex search landscapes.Starfish optimization algorithm(... Optimization problems are prevalent in various fields of science and engineering,with several real-world applications characterized by high dimensionality and complex search landscapes.Starfish optimization algorithm(SFOA)is a recently optimizer inspired by swarm intelligence,which is effective for numerical optimization,but it may encounter premature and local convergence for complex optimization problems.To address these challenges,this paper proposes the multi-strategy enhanced crested porcupine-starfish optimization algorithm(MCPSFOA).The core innovation of MCPSFOA lies in employing a hybrid strategy to improve SFOA,which integrates the exploratory mechanisms of SFOA with the diverse search capacity of the Crested Porcupine Optimizer(CPO).This synergy enhances MCPSFOA’s ability to navigate complex and multimodal search spaces.To further prevent premature convergence,MCPSFOA incorporates Lévy flight,leveraging its characteristic long and short jump patterns to enable large-scale exploration and escape from local optima.Subsequently,Gaussian mutation is applied for precise solution tuning,introducing controlled perturbations that enhance accuracy and mitigate the risk of insufficient exploitation.Notably,the population diversity enhancement mechanism periodically identifies and resets stagnant individuals,thereby consistently revitalizing population variety throughout the optimization process.MCPSFOA is rigorously evaluated on 24 classical benchmark functions(including high-dimensional cases),the CEC2017 suite,and the CEC2022 suite.MCPSFOA achieves superior overall performance with Friedman mean ranks of 2.208,2.310 and 2.417 on these benchmark functions,outperforming 11 state-of-the-art algorithms.Furthermore,the practical applicability of MCPSFOA is confirmed through its successful application to five engineering optimization cases,where it also yields excellent results.In conclusion,MCPSFOA is not only a highly effective and reliable optimizer for benchmark functions,but also a practical tool for solving real-world optimization problems. 展开更多
关键词 Global optimization starfish optimization algorithm crested porcupine optimizer METAHEURISTIC Gaussian mutation population diversity enhancement
在线阅读 下载PDF
Identification of small impact craters in Chang’e-4 landing areas using a new multi-scale fusion crater detection algorithm
12
作者 FangChao Liu HuiWen Liu +7 位作者 Li Zhang Jian Chen DiJun Guo Bo Li ChangQing Liu ZongCheng Ling Ying-Bo Lu JunSheng Yao 《Earth and Planetary Physics》 2026年第1期92-104,共13页
Impact craters are important for understanding the evolution of lunar geologic and surface erosion rates,among other functions.However,the morphological characteristics of these micro impact craters are not obvious an... Impact craters are important for understanding the evolution of lunar geologic and surface erosion rates,among other functions.However,the morphological characteristics of these micro impact craters are not obvious and they are numerous,resulting in low detection accuracy by deep learning models.Therefore,we proposed a new multi-scale fusion crater detection algorithm(MSF-CDA)based on the YOLO11 to improve the accuracy of lunar impact crater detection,especially for small craters with a diameter of<1 km.Using the images taken by the LROC(Lunar Reconnaissance Orbiter Camera)at the Chang’e-4(CE-4)landing area,we constructed three separate datasets for craters with diameters of 0-70 m,70-140 m,and>140 m.We then trained three submodels separately with these three datasets.Additionally,we designed a slicing-amplifying-slicing strategy to enhance the ability to extract features from small craters.To handle redundant predictions,we proposed a new Non-Maximum Suppression with Area Filtering method to fuse the results in overlapping targets within the multi-scale submodels.Finally,our new MSF-CDA method achieved high detection performance,with the Precision,Recall,and F1 score having values of 0.991,0.987,and 0.989,respectively,perfectly addressing the problems induced by the lesser features and sample imbalance of small craters.Our MSF-CDA can provide strong data support for more in-depth study of the geological evolution of the lunar surface and finer geological age estimations.This strategy can also be used to detect other small objects with lesser features and sample imbalance problems.We detected approximately 500,000 impact craters in an area of approximately 214 km2 around the CE-4 landing area.By statistically analyzing the new data,we updated the distribution function of the number and diameter of impact craters.Finally,we identified the most suitable lighting conditions for detecting impact crater targets by analyzing the effect of different lighting conditions on the detection accuracy. 展开更多
关键词 impact craters Chang’e-4 landing area multi-scale automatic detection YOLO11 Fusion algorithm
在线阅读 下载PDF
基于RSA的人工和自然膝关节上台阶运动分析
13
作者 刘建慧 葛沛烨 +7 位作者 郑超齐 王建平 汪利合 胡海 王金武 张晓辉 曲海军 李国安 《机械设计与研究》 北大核心 2025年第1期152-156,164,共6页
本研究征集自然人和全膝关节置换术(TKA)术后志愿者,利用计算机断层扫描(Computed Tomography,CT)建立膝关节三维模型,基于放射立体测量分析(RSA)原理,进行膝关节、胫股骨关节上台阶运动测量,研究自然人和术后患者上台阶运动动作特性。... 本研究征集自然人和全膝关节置换术(TKA)术后志愿者,利用计算机断层扫描(Computed Tomography,CT)建立膝关节三维模型,基于放射立体测量分析(RSA)原理,进行膝关节、胫股骨关节上台阶运动测量,研究自然人和术后患者上台阶运动动作特性。分析结果表明:人工膝关节屈曲受限,屈曲程度只到90°。随着屈曲程度增大,在内外旋方向上,自然膝关节外旋角持续增大,屈曲到90°,外旋角达到最大27°,然后缓慢减小;在内收外展方向上,人工膝关节随着屈曲的增大,会出现两种相反的状态,一部分持续内收,其余部分持续外展,而自然膝关节出现持续内收和由外展转变为内收两种状态。研究所得自然人和TKA术后患者上台阶运动的一系列数据以及对比分析结果,对患者的TKA手术治疗、术后的运动康复以及人工膝关节的持续改进提供了理论支撑。 展开更多
关键词 放射立体测量(rsa) 膝关节 CT扫描 上台阶运动
原文传递
基于RSA的自然和人工膝关节下蹲运动对比分析
14
作者 王建平 李强 +7 位作者 朱紫墨 刘建慧 汪利合 胡海 王金武 李瑜 曲海军 李国安 《机械设计与研究》 北大核心 2025年第1期187-192,共6页
膝关节运动学测量分析对临床膝关节治疗至关重要。本研究基于放射立体测量分析(RSA)原理,探索全膝关节置换术(TKA)后软组织缺失对人体下蹲运动规律的影响。征集自然人和TKA术后志愿者,利用CT扫描,得到膝关节三维模型,进行膝关节下蹲运动... 膝关节运动学测量分析对临床膝关节治疗至关重要。本研究基于放射立体测量分析(RSA)原理,探索全膝关节置换术(TKA)后软组织缺失对人体下蹲运动规律的影响。征集自然人和TKA术后志愿者,利用CT扫描,得到膝关节三维模型,进行膝关节下蹲运动的RSA测量。结果表明:随着屈曲程度增大,内外旋方向上,自然膝关节屈曲到98°,外旋角达到26.7°,随后外旋角减小。人工膝关节屈曲受限,屈曲程度小于100°,外旋角增加。内收外展方向上,自然膝关节存在内收和由外展变为内收两种状态,人工膝关节呈现内收和外展两种状态。人工和自然膝关节运动规律不同主要原因是前、后交叉韧带缺失和内侧副韧带松解,TKA保留相关软组织有助于人工膝关节正常运动。 展开更多
关键词 rsa技术 膝关节运动 3D配准 人工膝关节
原文传递
基于RSA模型和改进K-means算法的电商行业客户细分
15
作者 杨静 《计算机应用与软件》 北大核心 2025年第8期125-131,172,共8页
针对新兴的网络购物客户数量大、客户流动性强和消费数据多的特点,提出RSA模型结合改进的K-means聚类算法实现客户细分。采用熵值法计算RSA模型各指标的权重,综合各个属性计算客户价值。结合K近邻算法和密度峰值算法,提出一种基于K近邻... 针对新兴的网络购物客户数量大、客户流动性强和消费数据多的特点,提出RSA模型结合改进的K-means聚类算法实现客户细分。采用熵值法计算RSA模型各指标的权重,综合各个属性计算客户价值。结合K近邻算法和密度峰值算法,提出一种基于K近邻和密度峰值聚类的K-means初始聚类中心选取方法,优化传统K-means算法实现客户细分。通过选取的标准数据集和某零售公司在线交易的真实数据进行实验验证,证明了RSA模型和改进K-means算法具有更加优异的性能。 展开更多
关键词 rsa模型 客户细分 K-MEANS算法 密度峰值聚类 K近邻
在线阅读 下载PDF
一种基于优化解密过程的改进RSA算法
16
作者 刘娟 钱春旺 唐飞扬 《长春师范大学学报》 2025年第12期41-49,共9页
针对RSA算法解密效率低的问题,提出一种基于中国剩余定理的优化算法。将原始的大数幂模运算分解为两个并行的小数运算,结合Garner算法进行结果合成,显著降低了解密过程的计算复杂度。运用二进制扩展欧几里得算法加速模逆元计算,并对关... 针对RSA算法解密效率低的问题,提出一种基于中国剩余定理的优化算法。将原始的大数幂模运算分解为两个并行的小数运算,结合Garner算法进行结果合成,显著降低了解密过程的计算复杂度。运用二进制扩展欧几里得算法加速模逆元计算,并对关键步骤进行了形式化验证,确保其正确性与安全性。基于上述理论优化,实现了改进的RSA解密程序。实验结果表明,在不同明文长度下,改进算法的平均解密耗时仅为普通算法的37%,且解密结果完全正确。该研究为提升RSA算法在需要实时响应的场景中的实用性提供了有效方案。 展开更多
关键词 rsa算法 形式化验证 中国剩余定理 Garner算法 欧拉定理 二进制扩展欧几里得算法
在线阅读 下载PDF
A NEW RSA CRYPTOSYSTEM HARDWARE IMPLEMENTATION BASED ON MONTGOMERY'S ALGORITHM 被引量:5
17
作者 LU Jun-ming(卢君明) +1 位作者 LIN Zheng-hui(林争辉) 《Journal of Shanghai Jiaotong university(Science)》 EI 2002年第1期46-49,共4页
RSA public key crypto system is a relatively safe technology, which is widely used in today’s secure electronic communication. In this paper, a new implementation method to optimize a 1 024 bit RSA processor was pres... RSA public key crypto system is a relatively safe technology, which is widely used in today’s secure electronic communication. In this paper, a new implementation method to optimize a 1 024 bit RSA processor was presented. Basically, a fast modular multiplication architecture based on Montgomery’s algorithm was proposed. Modular exponentiation algorithm scans encryption from right to left, so two modular multiplications can be processed parallel. The new architecture is also fit for an effective I/O interface. The time to calculate a modular exponentiation is about n 2 clock cycles. The proposed architecture has a data rate of 93.7 kb/s for 1 024 bit work with a 100 MHz clock. 展开更多
关键词 MONTGOMERY algorithm MODULAR MULTIPLICATION rsa public-key crytosystem
在线阅读 下载PDF
CRT-RSA的小d_(p),d_(q)实际攻击研究
18
作者 李强 郑群雄 戚文峰 《密码学报(中英文)》 北大核心 2025年第3期604-626,共23页
CRT-RSA是由Quisquater和Couvreur于1982年提出的RSA变种,广泛应用于数据加密、数字签名、协议、身份认证等领域.小d_(p),d_(q)攻击是分析CRT-RSA应用安全性的一种重要方法,其目前最好的理论攻击结果是2019年由Takayasu、Lu和Peng给出的... CRT-RSA是由Quisquater和Couvreur于1982年提出的RSA变种,广泛应用于数据加密、数字签名、协议、身份认证等领域.小d_(p),d_(q)攻击是分析CRT-RSA应用安全性的一种重要方法,其目前最好的理论攻击结果是2019年由Takayasu、Lu和Peng给出的d_(p),d_(q)<N^(0.122),其中N为模数.然而,由于格基约化算法在高维格中约化效率和输出格基质量的下降,实际攻击很难达到该理论界.目前已知最好的实际攻击结果为d_(p),d_(q)≤N^(0.062)(N为1000 bits)和d_(p),d_(q)≤N^(0.0645)(N为2000 bits),与理论界尚有不小的差距.本文在Takayasu等人攻击的基础上,探索CRT-RSA小dp,dq攻击的实际可攻击上界以及如何在实际攻击中进一步提升该攻击上界.第一,对2019年Takayasu等人的格(简记为TLP2019格)进行优化,在确保TLP2019格仍为方阵的条件下去掉了两个unhelpful多项式,使得TLP2019格降低了两维.第二,针对当前缺乏CRT-RSA小d_(p),d_(q)实际可攻击上界的有效估计方法这一现状,结合实验中发现的TLP2019格约化输出的前三向量长度远远小于随机格中最短向量长度这一事实,给出了一种基于参数拟合的可攻击上界的估计方法,其估计结果与实验结果很好地吻合.第三,根据实验中与RSA小解密指数实际攻击类似的“多值现象”,提出了基于二分搜索的小d_(p),d_(q)实际攻击方法,提升了实际可攻击的上界.具体而言,对于模数1000 bits和2000 bits的CRT-RSA,在两周内分别实现了d_(p),d_(q)≤N^(0.067)和d_(p),d_(q)≤N^(0.0665)的实际攻击;对于某些特殊情形,甚至能够能将实际可攻击上界提升至N^(0.07)以上.相信本文的实际攻击探索能为后续CRT-RSA的小d_(p),d_(q)攻击研究带来启发和帮助. 展开更多
关键词 CRT-rsa 小d_(p) d_(q)攻击 实际攻击 高比特猜测 多值现象 二分搜索
在线阅读 下载PDF
A New Quantum Algorithm for Computing RSA Ciphertext Period 被引量:2
19
作者 WANG Yahui YAN Songyuan ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第1期68-72,共5页
Shor proposed a quantum polynomial-time integer factorization algorithm to break the RSA public-key cryptosystem.In this paper,we propose a new quantum algorithm for breaking RSA by computing the order of the RSA ciph... Shor proposed a quantum polynomial-time integer factorization algorithm to break the RSA public-key cryptosystem.In this paper,we propose a new quantum algorithm for breaking RSA by computing the order of the RSA ciphertext C.The new algorithm has the following properties:1)recovering the RSA plaintext M from the ciphertext C without factoring n; 2)avoiding the even order of the element; 3)having higher success probability than Shor's; 4)having the same complexity as Shor's. 展开更多
关键词 information security CRYPTOLOGY rsa cryptography quantum computing
原文传递
基于参数优化拟合和二分搜索的CRT-RSA小d_(q)实际攻击方法
20
作者 李强 戚文峰 《信息工程大学学报》 2025年第3期312-322,共11页
针对当前缺乏系统的方法来有效指导CRT-RSA小d_(q)实际攻击的问题,提出一种基于参数优化拟合和二分搜索的CRT-RSA小d_(q)实际攻击方法。首先对小d_(q)攻击参数τ_(p)、τ_(q)进行优化,基于优化的τ_(p)、τ_(q)值和约化格基长度的实验统... 针对当前缺乏系统的方法来有效指导CRT-RSA小d_(q)实际攻击的问题,提出一种基于参数优化拟合和二分搜索的CRT-RSA小d_(q)实际攻击方法。首先对小d_(q)攻击参数τ_(p)、τ_(q)进行优化,基于优化的τ_(p)、τ_(q)值和约化格基长度的实验统计,给出一种基于参数拟合的可攻击上界的估计方法,其估计结果与实验结果吻合;在该方法的指导下,对给定参数条件下的小d_(q)实际攻击上界进行探索;随后加入之前RSA小解密指数实际攻击探索时所提的模数素因子的高比特猜测策略,基于实验中的“多值现象”,提出适合并行实现的二分搜索攻击方法,该方法能有效提升给定参数下小d_(q)实际可攻击的上界。此外,对Takayasu等的格进行优化,并对其提出的helpful多项式在实际攻击中的效果进行探索,可为后续CRT-RSA的小d_(q)攻击研究带来启发和帮助。 展开更多
关键词 CRT-rsa体制 小d_(q)攻击 高比特猜测 多值现象 二分搜索
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部