排序方式: 共有79条查询结果,搜索用时 0 毫秒
1.
2.
In numerous modern stream ciphers, the internal state consists of a large array of pseudo-random words, while the output key-stream is a relatively simple function of the state. It has been heuristically shown in several situations [3], [8], [9], [10], [11] and [14] that this structure may lead to distinguishing attacks on the cipher. In this note we present a more rigorous treatment of this structural attack. First, we present a rigorous proof of the main probabilistic claim behind it in the basic cases. We then apply it concretely to the cipher sn3 [12], and demonstrate that the heuristic assumptions of the attack are remarkably precise in more complicated cases. 相似文献
3.
When an implementation under test (IUT) is state-based, and its expected abstract behavior is given in terms of a finite state machine (FSM), a checking sequence generated from a specification FSM and applied to an IUT for testing can provide us with high-level confidence in the correct functional behavior of our implementation. One of the issues here is to generate efficient checking sequences in terms of their lengths. As a major characteristics, a checking sequence must contain all β-sequences for transition verification. In this paper, we discuss the possibility of reducing the lengths of checking sequences by making use of the invertible transitions in the specification FSM to increase the choice of β-sequences to be considered for checking sequence generation. We present a sufficient condition for adopting alternative β-sequences and illustrate typical ways of incorporating these alternative β-sequences into existing methods for checking sequence generation to reduce the lengths. Compared to the direct use of three existing methods, our experiments show that most of the time the saving gained by adopting alternative β-sequences falls in the range of 10–40%. 相似文献
4.
The drawbacks of SVD-based image watermarking are false positive, robust and transparency. The former can be overcome by embedding the principal components of the watermark into the host image, the latter is dependent on how much the quantity (i.e., scaling factor) of the principal components is embedded. For the existing methods, the scaling factor is a fixed value; actually, it is image-dependent. Different watermarks need the different scaling factors, although they are embedded in the same host image. In this paper, two methods are proposed to improve the reliability and robustness. To improve the reliability, for the first method, the principal components of the watermark are embedded into the host image in discrete cosine transform (DCT); and for the second method, those are embedded into the host image in discrete wavelets transform (DWT). To improve the robustness, the particle swarm optimization (PSO) is used for finding the suitable scaling factors. The experimental results demonstrate that the performance of the proposed methods outperforms than those of the existing methods. 相似文献
5.
在对电力系统中同调机群的识别方法进行研究的同时,并对以往的各种同调机群的识别方法也进行了归纳总结,针对这些方法所存在的问题,给出了一种新的较为实用的同调机群识别方法。 相似文献
6.
李扬 《武汉化工学院学报》1997,19(2):75-78
通过分析比较,采用Besier方法拟合所需的一组空间曲线,并用平面切割曲线,求解出平面与拟合空间曲线的交点.在求交过程中引入优化方法判断交点真伪性,从而得到所需拟合的空间曲线与平面相交交点. 相似文献
7.
S. Snowden P. Weech R. McClure S. W. Smye P. R. F. Dear 《Neural computing & applications》1995,3(4):234-241
The development of a feed-forward neural network to predict attendance and non-attendance at a hospital outpatient clinic is described. Particular emphasis is given to the post-processing applied to the network output, and to the choice of information presented to the network. The effect of individual inputs on the performance of the network is examined, and two methods of dealing with the problem of ambiguous input data are explored. It is shown that good results (approximately 90% accuracy) are achieved with a feedforward network — having 15 input nodes, a single hidden layer of five nodes and one output node with supervised backpropagation — even where data is limited, and that an understanding of the problem can lead to the modification of standard procedures and improved network performance. 相似文献
8.
9.
10.