A new 5-round distinguisher of AES with key whitening is presented by using the properties of its round transformation. Based on this distinguisher,we present new meet-in-the-middle attacks on reduced AES considering ...
详细信息
A new 5-round distinguisher of AES with key whitening is presented by using the properties of its round transformation. Based on this distinguisher,we present new meet-in-the-middle attacks on reduced AES considering the key schedule and the time-memory tradeoff approach. New attacks improve the best known meet-in-the-middle attacks on reduced AES presented at *** reduce the time complexity of attacks on 7-round AES-192 and 8-round AES-256 by a factor of at least 28. Moreover,the distinguisher can be exploited to develop the attack on 8-round AES-192.
Similarity matching is one of the most important operations for data mining over time series. But previous works mainly focus on certain data. With the development of the internet of things and sensor networks, uncert...
详细信息
The crosscutting phenomena has been found at architectural level. Using aspects, AOP effectively solves the code tangling problem produced by the crosscutting phenomena at code level. This paper presents an approach t...
详细信息
Many practical applications are dynamic over time, which require optimization algorithms not only to converge to optimum as soon as possible but also to track the changing optimum. In this paper, a Cooperative Dual-sw...
详细信息
Character Modeling is becoming more and more difficult in animation industry today. Lots of designers are usually involved to cooperatively accomplish a character by computer networks or the Internet. This paper prese...
详细信息
In this paper, we present a novel color-mood-aware technique to re-texture clothing in a photograph. An efficient classification algorithm is developed to classify clothing textures using color mood scheme. To re-text...
详细信息
In this paper, we propose a distributed resource allocation framework for cognitive radio networks by using the orthogonal frequency division multiple access (OFDMA) modulation. We jointly consider the constraints of ...
详细信息
This paper proposes a novel genetic clustering algorithm, called a real-valued quantum genetic niching clustering algorithm (RQGN), which is based on the concept and principles of quantum computing, such as the qubits...
详细信息
In wireless sensor networks (WSNs), trap coverage has recently been proposed to tradeoff between the availab.lity of sensor nodes and sensing performance. It offers an efficient framework to tackle the challenge of li...
详细信息
With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dyn...
详细信息
With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalab.e and often virtuMized resources are provided as services. With virtualization technology, cloud computing offers diverse services (such as virtual computing, virtual storage, virtual bandwidth, etc.) for the public by means of multi-tenancy mode. Although users are enjoying the capabilities of super-computing and mass storage supplied by cloud computing, cloud security still remains as a hot spot problem, which is in essence the trust management between data owners and storage service providers. In this paper, we propose a data coloring method based on cloud watermarking to recognize and ensure mutual reputations. The experimental results show that the robustness of reverse cloud generator can guarantee users' embedded social reputation identifications. Hence, our work provides a reference solution to the critical problem of cloud security.
暂无评论