期刊文献+
共找到42篇文章
< 1 2 3 >
每页显示 20 50 100
INTEGRAL DISTINGUISHERS OF JH AND GRSTL-512 被引量:2
1
作者 LiYanjun WuWenling DongLe 《Journal of Electronics(China)》 2012年第1期94-102,共9页
In December of 2010 NIST selected five SHA-3 finalists - BLAKE, Grcstl, JH, Keccak, and Skein to advance to the third (and final) round of the SHA-3 competition. At present most specialists and scholars focus on the... In December of 2010 NIST selected five SHA-3 finalists - BLAKE, Grcstl, JH, Keccak, and Skein to advance to the third (and final) round of the SHA-3 competition. At present most specialists and scholars focus on the design and the attacks on these hash functions. However, it is very significant to study some properties of their primitives and underlying permutations. Because some properties reflect the pseudo-randomness of the structures. Moreover, they help us to find new cryptanalysis for some block cipher structures. In this paper, we analyze the resistance of JH and Grcstl-512 against structural properties built on integral distinguishers. And then 31.5 (out of 42) rounds integral distinguishers for JH compression function and 11.5 (out of 14) rounds for Grcstl-512 compression function are presented. 展开更多
关键词 Hash function SHA-3 candidates Integral distinguisher JH Grcstl
在线阅读 下载PDF
TWO FEEDBACK PROBLEMS FOR GRAPHS WITH BOUNDED TREE-WIDTH
2
作者 ZhangShaoqiang LiGuojun SohnMoo-Young 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2004年第2期149-154,共6页
Many difficult (often NP-complete) optimization problems can be solved efficiently on graphs of small tree-width with a given tree-decomposition.In this paper,it is discussed how to solve the minimum feedback vertex s... Many difficult (often NP-complete) optimization problems can be solved efficiently on graphs of small tree-width with a given tree-decomposition.In this paper,it is discussed how to solve the minimum feedback vertex set problem and the minimum vertex feedback edge set problem efficiently by using dynamic programming on a tree-decomposition. 展开更多
关键词 feedback vertex set feedback edge set tree-decomposition tree-width dynamic programming.
在线阅读 下载PDF
Some Results Concerning a Singular Intergal
3
作者 QIAOJian-wei LINGFeng-cai ZHANGZhen-feng 《Chinese Quarterly Journal of Mathematics》 CSCD 2004年第2期213-217,共5页
In this note, we present some detail estimates for the integral with general integer k, as well as a singular integral formed from it, which would be useful for some nonlinear additive problems of primes.
关键词 singular integral additive prime problem
在线阅读 下载PDF
Reduction Algorithms Based on Discernibility Matrix:The Ordered Attributes Method 被引量:130
4
作者 王珏 王驹 《Journal of Computer Science & Technology》 SCIE EI CSCD 2001年第6期489-504,共16页
In this paper, we present reduction algorithms based on the principle of Skowron's discernibility matrix - the ordered attributes method. The completeness of the algorithms for Pawlak reduct and the uniqueness for... In this paper, we present reduction algorithms based on the principle of Skowron's discernibility matrix - the ordered attributes method. The completeness of the algorithms for Pawlak reduct and the uniqueness for a given order of the attributes are proved. Since a discernibility matrix requires the size of the memory of U2, U is a universe of objects, it would be impossible to apply these algorithms directly to a massive object set. In order to solve the problem, a so-called quasi-discernibility matrix and two reduction algorithms are proposed. Although the proposed algorithms are incomplete for Pawlak reduct, their opimal paradigms ensure the completeness as long as they satisfy some conditions. Finally we consider the problem on the reduction of distributive object sets. 展开更多
关键词 rough set theory principle of discernibility matrix inductive machine learning
原文传递
Runtime software architecture based on reflective middleware 被引量:18
5
作者 HUANGGang MEIHong YANGFuqing 《Science in China(Series F)》 2004年第5期555-576,共22页
There exists a consensus that software architecture (SA) plays a central role in software development and also plays an important role in the lifecycle phases after software delivery. Particularly, SA can be used to r... There exists a consensus that software architecture (SA) plays a central role in software development and also plays an important role in the lifecycle phases after software delivery. Particularly, SA can be used to reduce the great difficulty and cost of software maintenance and evolution. In this paper, runtime software architecture (RSA) based on reflective middleware is proposed to support architecture-based software maintenance and evolution. In this approach, the actual states and behaviors of the runtime system can be observed and manipulated in a consistent and understandable way through its architectural view. Being an accurate, up-to-date, semantic and operable view of SA, RSA looks components and connectors as white-box entities to accurately and thoroughly describe the runtime system, extends traditional architecture description languages to formally describe itself and naturally inherit plentiful semantics in traditional views of SA, and utilizes reflective middleware to observe and manipulate the runtime system. In order to demonstrate the feasibility of this approach, a reflective J2EE application server, called PKUAS, is implemented to observe and manipulate the components, connectors and constraints in the runtime system. Finally, the performance evaluation proves that making RSA explicit and operable at runtime has little effect on the runtime system. 展开更多
关键词 software architecture software maintenance software evolution reflective middleware.
原文传递
Predicate μ-Calculus for Mobile Ambients 被引量:6
6
作者 Hui-MinLin 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第1期95-104,共10页
Ambient logics have been proposed to describe properties for mobile agentswhich may evolve over time as well as space. This paper takes a predicate-based approach toextending an ambient logic with recursion, yielding ... Ambient logics have been proposed to describe properties for mobile agentswhich may evolve over time as well as space. This paper takes a predicate-based approach toextending an ambient logic with recursion, yielding a predicate μ-calculus in which fixpointformulas are formed using predicate variables. An algorithm is developed for model checkingfinite-control mobile ambients against formulas of the logic, providing the first decidabilityresult for model checking a spatial logic with recursion. 展开更多
关键词 model checking mobile ambients spatial logic MU-CALCULUS fixpoints
原文传递
New Semantic Model for Authentication Protocols in ASMs 被引量:5
7
作者 RuiXue Deng-GuoFeng 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第4期555-563,共9页
A new semantic model in Abstract State Model (ASM) for authentication protocols is presented. It highlights the Woo-Lam's ideas for authentication, which is the strongest one in Lowe's definition hierarchy for... A new semantic model in Abstract State Model (ASM) for authentication protocols is presented. It highlights the Woo-Lam's ideas for authentication, which is the strongest one in Lowe's definition hierarchy for entity authentication. Apart from the flexible and natural features in forming and analyzing protocols inherited from ASM, the model defines both authentication and secrecy properties explicitly in first order sentences as invariants. The process of proving security properties with respect to an authentication protocol blends the correctness and secrecy properties together to avoid the potential flaws which may happen when treated separately. The security of revised Helsinki protocol is shown as a case study. The new model is different from the previous ones in ASMs. 展开更多
关键词 cryptographic protocol formal analysis abstract state machine (ASM) authentication protocol
原文传递
Linear Secret Sharing Schemes and Rearrangements of Access Structures 被引量:5
8
作者 Liang-liangXiao Mu-lanLiu 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2004年第4期685-694,共10页
In this paper we study linear secret sharing schemes by monotone span programs, according to the relation between realizing access structures by linear secret sharing schemes and computing monotone Boolean functions b... In this paper we study linear secret sharing schemes by monotone span programs, according to the relation between realizing access structures by linear secret sharing schemes and computing monotone Boolean functions by monotone span programs. We construct some linear secret sharing schemes. Furthermore, we study the rearrangements of access structures that is very important in practice. 展开更多
关键词 Access structure linear secret sharing scheme monotone span program rearrangement of access structure
原文传递
Collision attack on reduced-round Camellia 被引量:7
9
作者 WUWenling FENGDengguo 《Science in China(Series F)》 2005年第1期78-90,共13页
Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between 4-round Camellia and a random permutation of the blocks space. By using collision-searc... Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between 4-round Camellia and a random permutation of the blocks space. By using collision-searching techniques, the distinguishers are used to attack on 6, 7, 8 and 9 rounds of Camellia with 128-bit key and 8, 9 and 10 rounds of Camellia with 192/256-bit key. The 128-bit key of 6 rounds Camellia can be recovered with 210 chosen plaintexts and 215 encryptions. The 128-bit key of 7 rounds Camellia can be recovered with 212 chosen plaintexts and 254.5 encryptions. The 128-bit key of 8 rounds Camellia can be recovered with 213 chosen plaintexts and 2112.1 encryptions. The 128-bit key of 9 rounds Camellia can be recovered with 2113.6 chosen plaintexts and 2121 encryptions. The 192/256-bit key of 8 rounds Camellia can be recovered with 213 chosen plaintexts and 2111.1 encryptions. The 192/256-bit key of 9 rounds Camellia can be recovered with 213 chosen plaintexts and 2175.6 encryptions. The 256-bit key of 10 rounds Camellia can be recovered with 214 chosen plaintexts and 2239.9 encryptions. 展开更多
关键词 block cipher collision attack KEY data complexity time complexity.
原文传递
Decomposing a Kind of Weakly Invertible Finite Automata with Delay 2 被引量:3
10
作者 YAOGang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2003年第3期354-360,共7页
Some properties of a finite automaton composed of two weakly invertible finite automata with delay 1 are given, where each of those two automata has the output set of each state with the same size. And for a weakly in... Some properties of a finite automaton composed of two weakly invertible finite automata with delay 1 are given, where each of those two automata has the output set of each state with the same size. And for a weakly invertible finite automaton M with delay 2 satisfying the properties mentioned in this paper, two weakly invertible finite automata with delay 1 are constructed such that M is equivalent to a sub-finite-automaton of the composition of those two. So a method to decompose this a kind of weakly invertible finite automata with delay 2 is presented. 展开更多
关键词 finite automaton weakly invertible DELAY COMPOSITION DECOMPOSITION
原文传递
Towards a Theory of Bisimulation for the Higher-Order Process Calculi 被引量:2
11
作者 Yong-JianLi Xin-XinLiu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第3期352-363,共12页
In this paper, a labelled transition semantics for higher-order processcalculi is studied. The labelled transition semantics is relatively clean and simple, andcorresponding bisimulation equivalence can be easily form... In this paper, a labelled transition semantics for higher-order processcalculi is studied. The labelled transition semantics is relatively clean and simple, andcorresponding bisimulation equivalence can be easily formulated based on it. And the congruenceproperties of the bisimulation equivalence can be proved easily. To show the correspondence betweenthe proposed semantics and the well-established ones, the bisimulation is characterized as a versionof barbed equivalence and a version of context bisimulation. 展开更多
关键词 higher-order process labelled transition semantics barbed bisimulation context-bisimulation
原文传递
A new formal model for privilege control with supporting POSIX capability mechanism 被引量:3
12
作者 JIQingguang QINGSihan HEYeping 《Science in China(Series F)》 2005年第1期46-66,共21页
In order to enforce the least privilege principle in the operating system, it is necessary for the process privilege to be effectively controlled; but this is very difficult because a process always changes as time ch... In order to enforce the least privilege principle in the operating system, it is necessary for the process privilege to be effectively controlled; but this is very difficult because a process always changes as time changes. In this paper, based on the analysis on how the process privilege is generated and how it works, a hierarchy implementing the least privilege principle with three layers, i.e. administration layer, functionality control layer and performance layer, is posed. It is clearly demonstrated that to bound privilege's working scope is a critical part for controlling privilege, but this is only mentioned implicitly while not supported in POSIX capability mechanism. Based on analysis of existing control mechanism for privilege, not only an improved capability inheritance formula but also a new complete formal model for controlling process based on integrating RBAC, DTE, and POSIX capability mechanism is introduced. The new invariants in the model show that this novel privilege control mechanism is different from RBAC's, DTE's, and POSIX's, and it generalizes subdomain control mechanism and makes this mechanism dynamic. 展开更多
关键词 formal model least privilege role DOMAIN capability.
原文传递
Constructing Finite Automata with Invertibility bytransformation Method 被引量:2
13
作者 陶仁骥 陈世华 《Journal of Computer Science & Technology》 SCIE EI CSCD 2000年第1期10-26,共17页
Ra, Rb transformations were successfully applied to establish invertibility theory for linear and quasi-linear finite automata over finite fields. In aprevious paper, the authors generalized R., Rb transformations to ... Ra, Rb transformations were successfully applied to establish invertibility theory for linear and quasi-linear finite automata over finite fields. In aprevious paper, the authors generalized R., Rb transformations to deal with nonlinear memory finite automata, and gave sufficient conditions for weak inverse andfor weakly invertible memory finite automata and inversion processes concerned;methods by transformation to generate a kind of nonlinear memory finite automatasatisfying one of these sufficient conditions were also given. This paper extends theconcepts, methods and results to general finite automata, in which states consist offinite input history, finite output history and finite 'inner state' history. 展开更多
关键词 finite automata INVERTIBILITY public key cryptosystem
原文传递
Dynamic Checking Frameworkfor Java Beaus Semantic Constraints 被引量:1
14
作者 倪彬 冯玉琳 《Journal of Computer Science & Technology》 SCIE EI CSCD 1999年第4期408-413,共6页
Java Beans is a standard for software components. For checkingthe consistency of the Java Beaus semantic constraints with its implementation,this paper proposes a formal Java Beaus Description Language (JBDL) to speci... Java Beans is a standard for software components. For checkingthe consistency of the Java Beaus semantic constraints with its implementation,this paper proposes a formal Java Beaus Description Language (JBDL) to specifycomponent semantic constraints. The JBDL logic is based on many sorted firstorder logic and Computation Tree Logic (CTL), with extension of some facilities inspecifying object oriented features. A framework for dynamic checking Java Beaussemantic constraines in JBDL form is described in this paper and some experimentalresults are showed by examples. 展开更多
关键词 Java Beaus semantic constraints SPECIFICATION dynamic checking
原文传递
An Orientation Update Message Filtering Algorithm in Collaborative Virtual Environments 被引量:1
15
作者 Mao-JunZhang NicolasD.Georganas 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第3期423-428,F003,共7页
Orientation update message filtering is an important issue in collaborativevirtual environments (CVEs). Dead-reckoning (DR) is a known effective mechanism for update messagefiltering. Yet, previous dead-reckoning tech... Orientation update message filtering is an important issue in collaborativevirtual environments (CVEs). Dead-reckoning (DR) is a known effective mechanism for update messagefiltering. Yet, previous dead-reckoning techniques mainly focus on the update message filtering forpositions. The existing orientation dead-reckoning algorithms are based on fixed threshold values.The drawbacks of fixed thresholding for orientations (FTO) are discussed in this paper. We propose avariable thresholding for orientations (VTO) based on average recent angular velocity. The mainadvantage of the proposed VTO is the ability of balancing the number of state update messages andshift frequency of direction and speed of rotation. 展开更多
关键词 dead-reckoning orientation update message filtering variable thresholdingfor orientations average recent angular velocity collaborative virtual environments
原文传递
Linear cryptanalysis of NUSH block cipher 被引量:2
16
作者 吴文玲 冯登国 《Science in China(Series F)》 2002年第1期59-67,共9页
NUSH is a block cipher as a candidate for NESSIE. NUSH is analyzed by linear crypt-analysis . The complexity δ = (ε , η) of the attack consists of data complexity ε and time complexity η. Three linear approximati... NUSH is a block cipher as a candidate for NESSIE. NUSH is analyzed by linear crypt-analysis . The complexity δ = (ε , η) of the attack consists of data complexity ε and time complexity η. Three linear approximations are used to analyze NUSH with 64-bit block. When |K| = 128 bits, the complexities of three attacks are (258, 2124), (260, 278) and (262, 255) respectively. When |K| = 192 bits, the complexities of three attacks are (258, 2157) (260, 2%) and (262, 258) respectively. When |K| = 256 bits, the complexities of three attacks are (258, 2125), (260, 278) and (262, 253) respectively. Three linear approximations are used to analyze NUSH with 128-bit block. When |K|= 128 bits, the complexities of three attacks are (2122, 295), (2124, 257) and (2126, 252) respectively. When |K| = 192 bits, the complexities of three attacks are (2122, 2142), (2124, 275) and (2126, 258) respectively. When |K|= 256 bits, the complexities of three attacks are (2122, 2168), (2124, 281) and (2126, 264) respectively. Two linear approximations are used to analyze NUSH with 256-bit block. When |K|= 128 bits, the complexities of two attacks are (2252, 2122) and (2254, 2119) respectively. When |K|= 192 bits, the complexities of two attacks are (2252, 2181) and (2254, 2177) respectively. When |K|=256 bits, the complexities of two attacks are (2252, 2240) and (2254, 2219) respectively. These results show that NUSH is not immune to linear cryptanalysis, and longer key cannot enhance the security of NUSH. 展开更多
关键词 block cipher linear cryptanalysis linear approximation.
原文传递
On the Structure of Binary Feedforward Inverses with Delay 2 被引量:1
17
作者 朱新杰 《Journal of Computer Science & Technology》 SCIE EI CSCD 1989年第2期163-171,共9页
Let M'=S(Mα,f)be a semi-input-memory finite automaton with input alphabet Y and output alphabet X.If X=Y={0,1},then M' is a feedforware inverse with delay 2 if and only if there exists a cycle c of state diag... Let M'=S(Mα,f)be a semi-input-memory finite automaton with input alphabet Y and output alphabet X.If X=Y={0,1},then M' is a feedforware inverse with delay 2 if and only if there exists a cycle c of state diagram of Mαsuch that f(y0,…,yc,λα(t)0 can be expressed in the form of f ^(1)(y0,…,yc-1,λα(t))+yc for any state t in C and y0,y1,…,yc in Y;or of f^(2)(y0,…,yc-2,λα(t))+yc-c for any state t in Cand y0,y1,…,yc in Y;or for any state t in Cand y0,y1,…yc,in Y,y0,y1…yc satisfies the D[t] condition.The socalled y0,y1…yc satisfying the D[t] condition is that:for some i,j,(i,j)∈{(1,2),(1,3),(2,1),(2,2),(3,1),(3,2)},there exists a (c+2-k)-ary function f^(k),k=1,2,3,such that the Equation(1)and Equation (2)hokl simultaneously for all y'c-2,…,y'c+1∈Y. Equation (1);f(y0,…,yc-i,y'c-i+1,…y'c,λα(t))=f^(j)(y0,…yc-i,λα(t))+y'c-i+1 Equation (2):f(y1,…,yc-j+1,y'c-j+2,…,y'c+1,λα(t))=f^(j)(y1,…,yc-j+1,λα(t))+y'c-j+s where t=δα(t)and if (i,j)=(1,2)then one and only one of the following conditions C1 and C2 holds for all y'c-1,y'c,y'c+1∈Y.Condition C1:there exists a c-ary function g^(1),such that f(y0,…,yc-2,y'c-1,y'c,λα(t))=g^(1),(y0,…,yc-2,λα(t))+y'c-1(+)y'c;Condition C2:there exists a (c-1)-ary functiong g^(2)such that f(y1,…,yc-2,y'c-1,y'c,y'c+1,λα(t))=g^(2)(y1,…,yc-2,λα(t))+y'c-1+y'c,where t=δα(t). 展开更多
关键词 数字信息编码器 二进制前馈 可逆性
原文传递
ASYMPTOTICALLY OPTIMAL SUCCESSIVE OVERRELAXATION METHODS FOR SYSTEMS OF LINEAR EQUATIONS 被引量:2
18
作者 Zhong-zhiBai Xue-binChi 《Journal of Computational Mathematics》 SCIE EI CSCD 2003年第5期603-612,共10页
We present a class of asymptotically optimal successive overrelaxation methods for solving the large sparse system of linear equations. Numerical computations show that these new methods are more efficient and robust ... We present a class of asymptotically optimal successive overrelaxation methods for solving the large sparse system of linear equations. Numerical computations show that these new methods are more efficient and robust than the classical successive overrelaxation method. 展开更多
关键词 Successive Overrelaxation Methods System of Linear Equations.
原文传递
Chinese TrueType Font Support in X Window 被引量:1
19
作者 叶以民 孙玉方 《Journal of Computer Science & Technology》 SCIE EI CSCD 1999年第1期27-33,共7页
it is of great significance to provide Chinese TrueType font support in X Window. This paper describes the work of adding a Chinese ThueType font ren- derer under X's font support mechanism. First, the origin of t... it is of great significance to provide Chinese TrueType font support in X Window. This paper describes the work of adding a Chinese ThueType font ren- derer under X's font support mechanism. First, the origin of the idea is introduced, followed by a brief study of ThueType font and its rasterization algorithm, then the font support mechanism in X Window is discussed. Finally, an overall illustration of the Chinese ThueType font renderer is given. 展开更多
关键词 Chinese font TRUETYPE X Window
原文传递
Practical Type Checking of Functions Defined on Context-Free Languages 被引量:1
20
作者 Hai-MingChen Yun-MeiDong 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期840-847,共8页
A type checking method for the functional language LFC is presented. A distinct feature of LFC is that it uses Context-Free (CF) languages as data types to represent compound data structures. This makes LFC a dynamica... A type checking method for the functional language LFC is presented. A distinct feature of LFC is that it uses Context-Free (CF) languages as data types to represent compound data structures. This makes LFC a dynamically typed language. To improve efficiency, a practical type checking method is presented, which consists of both static and dynamic type checking. Although the inclusion relation of CF languages is not decidable, a special subset of the relation is decidable, i.e., the sentential form relation, which can be statically checked. Moreover, most of the expressions in actual LFC programs appear to satisfy this relation according to the statistic data of experiments. So, despite that the static type checking is not complete, it undertakes most of the type checking task. Consequently the run-time efficiency is effectively improved. Another feature of the type checking is that it converts the expressions with implicit structures to structured representation. Structure reconstruction technique is presented. 展开更多
关键词 type checking context-free language ALGORITHM
原文传递
上一页 1 2 3 下一页 到第
使用帮助 返回顶部