攻击
- 与 攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Finally, the strict formal analysis is made for ZDB protocol(1999) proposed by Zhou et al. With this new method, as a result there exists 2 possible attacks in the ZDB protocol under non-secrecy channels: leakiness of secret information and reply attacks.
最后本文用新方法对Zhou等人(1999)提出的 ZDB协议进行了严格的形式化分析,结果发现该协议在非保密通道下存在两个可能的攻击:保密信息泄露和重放攻击。
-
Is then the federal government destitute of every authority for restraining the licentiousness of the press, and for shielding itself against the libelous attacks which may be made on those who administer it?
那么,是联邦政府为了限制放任自由,以及为屏蔽对他可能的攻击,这些攻击或许会针对那些管理者,而剥夺新闻界的一切权力?
-
Description:Use a long range stance to increase your Attack Range at the cost of reducing your attack angle and limiting your movement to walking.
增加攻击范围,代价是减低攻击角度和限制移动
-
There has been significant speculation that Navy dolphins are trained in attack missions, such as direct attacks against swimmers in the water or attaching limpet mines to enemy ships in harbor.
曾有大量猜测称,海军的这些海豚是受训来完成攻击任务的,如对水下游泳者的直接攻击或是将吸附式水雷贴附到港口中的敌军船只上。
-
These methods can effectively reject the attack of the baleful programs or codes, and by use of the audit record, we can analyse the attack and find out the malefactor eventually.
这一系列的措施可以使我们有效的进行事前抵御攻击和事后分析攻击。
-
OS Attacks, on the other hand, still do what they are intended to do and that is to maliciously attack the web.
oS攻击,另一方面,仍然做他们是打算这么做,这是恶意攻击网络。
-
A marine scientist said the attack by the sea lion, which can grow to more than 880 pounds in weight but usually stay away from humans, was bizarre and that the sea lion may have been trying to play with the girl.
这只攻击小女孩的海狮的体重超过880磅。海洋学家说海狮通常不会去招惹人类,这次海狮的攻击让人感到奇怪,也是它只是想和小女孩玩玩。
-
Effect: Current unit being attacked has a reduced movespeed of 25%, Marksman loses 30 damage.
效果 被攻击的单位会降低百分之25的移动速度,特派狙击手的攻击减少30的伤害。
-
Marm was wounded in the neck and jaw in the assault and was later awarded the Medal of Honor for his lone assault.
Marm的脖子和下颌在攻击时受伤,因为这次独立攻击他被授予了荣誉勋章。
-
Using the concept of Boolean functions and combinatorics theory comprehensively, we investigate the construction on annihilators of Boolean functions and the algebraic immunity of symmetric Boolean functions in cryptography:Firstly, we introduce two methods of constructing the annihilators of Boolean functions, Construction I makes annihilators based on the minor term expression of Boolean function, meanwhile we get a way to judge whether a Boolean function has low degree annihilators by feature matrix. In Construction II, we use the subfunctions to construct annihilators, we also apply Construction II to LILI-128 and Toyocrypt, and the attacking complexity is reduced greatly. We study the algebraic immunitiy of (5,1,3,12) rotation symmetric staturated best functions and a type of constructed functions, then we prove that a new class of functions are invariants of algebraic attacks, and this property is generalized in the end.Secondly, we present a construction on symmetric annihilators of symmetric Boolean functions.
本文主要利用布尔函数的相关概念并结合组合论的相关知识,对密码学中布尔函数的零化子构造问题以及对称布尔函数代数免疫性进行了研究,主要包括以下两方面的内容:首先,给出两种布尔函数零化子的构造方法,构造Ⅰ利用布尔函数的小项表示构造零化子,得到求布尔函数f代数次数≤d的零化子的算法,同时得到通过布尔函数的特征矩阵判断零化子的存在性:构造Ⅱ利用布尔函数退化后的子函数构造零化子,将此构造方法应用于LILI-128,Toyocrypt等流密码体制中,使得攻击的复杂度大大降低;通过研究(5,1,3,12)旋转对称饱和最优函数的代数免疫和一类构造函数的代数免疫,证明了一类函数为代数攻击不变量,并对此性质作了进一步推广。
- 推荐网络例句
-
However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.
然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。
-
Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.
镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。
-
A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.
付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。