In this paper, we propose a model-based reconstruction method for recovering a 2D parametric styling model with hierarchical structure from an image. Our method extracts characteristic features for industrial design w...
详细信息
At present,the research on reverse analysis of encrypting and decrypting process pays more attention to cryptographic algorithms *** is no mature theory or tools for the entire process analysis of encryption and *** o...
详细信息
At present,the research on reverse analysis of encrypting and decrypting process pays more attention to cryptographic algorithms *** is no mature theory or tools for the entire process analysis of encryption and *** order to solve the problem efficiently,this paper discusses encryption and decryption process dependency graphs,summarizes the existing research results about the cryptographic algorithms recognition technology,and explores a way to research the process analysis of encryption and decryption based on process dependency ***,the result on an example reveals the entire process analysis of encryption and decryption.
There are two main approaches to achieve selective opening chosen-cipher text security (SO-CCA security): lossy encryption (including all-but-many lossy trapdoor functions) and sender-equivocable encryption. The secon...
详细信息
A binary program is a set of binary data and operations on the data. In binary translation, operations on the source machine will be transplanted to the target machine. Also, the data which the operations depend on sh...
详细信息
ISBN:
(纸本)9781479927623
A binary program is a set of binary data and operations on the data. In binary translation, operations on the source machine will be transplanted to the target machine. Also, the data which the operations depend on should be migrated to the target machine, so as to ensure the complete consistency of the data accessed by the transplanted target codes and the data accessed by the source codes. Firstly, the method is presented in this paper to convert the access to the data on the source machine to the access to the corresponding data on the target machine for the user-defined procedure, and to ensure the correctness of the accessed data on the target machine in the meanwhile. Then, for the binary translation from x64 architecture to RISC architecture, the data recovery method based on semantic mapping and balanced stack frame is proposed. Also, problems in data recovery for the user-defined procedure are solved by the proposed method.
Due to the problem of semantic lost when extracting birthmark with k-gram algorithm, the operand stack dependence based static software birthmark is proposed in this paper. Before the birthmark extraction, the stack d...
详细信息
ISBN:
(纸本)9781467352512
Due to the problem of semantic lost when extracting birthmark with k-gram algorithm, the operand stack dependence based static software birthmark is proposed in this paper. Before the birthmark extraction, the stack dependence bytecode fragments are got through analysis the stack dependence relation of stack behaviors in Java program. The birthmark is comprised of the stack dependence bytecode fragments and their occurrence frequencies in program. The experimental results show that the proposed birthmark has good credibility and robustness, and the performance is improved.
At present, the research on security of computer system and searching for malicious codes pays more attention to cryptographic algorithms recognition technology. However, the existing theories or tools in the field of...
详细信息
At present, the research on security of computer system and searching for malicious codes pays more attention to cryptographic algorithms recognition technology. However, the existing theories or tools in the field of cryptographic algorithms recognition are not mature. In order to improve the accuracy of cryptographic algorithms recognizing, this paper discusses encryption and decryption functions characteristic information database and proposes a recognition model to recognize cryptographic algorithms from binary files. The accuracy assessment indicates the model is effective and feasible.
Nowadays SIMD extensions became ubiquitous for computational platform, being widely used in signal processing, multimedia, and scientific applications. However, compilers still have difficult in vectorizing some appli...
详细信息
Nowadays SIMD extensions became ubiquitous for computational platform, being widely used in signal processing, multimedia, and scientific applications. However, compilers still have difficult in vectorizing some applications, such as computations on non-contiguous and especially interleaved data, and loop nest for which inner loops that carry all the dependencies and external loops with strided memory accesses. In order to solve these problems, we adopt Isomorphic statements Grouping (ISG) after extending group following UD and DU chains, which group isomorphic computation statements that perform the same operation. And correspondingly, we generate vector permutation instructions according to the target ISA SIMD instructions at the SIMD code generation phase. This approach has been implemented in a compiler based on Open64 which translate C source program to C source program with SIMD intrinsic functions. Experiments with this compiler show that ISG Super Level Parallelism(ISG-SLP) can be used to compile a number of real-world kernels, achieving up to 3.11 speedup.
Protecting the security of sensitive information has become a matter of great concern to *** hiding tech nique solves the problem to some extent, but still, some short comings remain for *** improve the capability of ...
详细信息
Protecting the security of sensitive information has become a matter of great concern to *** hiding tech nique solves the problem to some extent, but still, some short comings remain for *** improve the capability of hid ing huge data file in disk with high *** this paper, we propose a novel approach called CryptFS, which is achieved by utilizing the file access mechanism and modifying the cluster chain structure to hide *** can quickly hide data file with G bytes size in less than *** time used for hiding and recovering data is irrelevant to the size of data file, and the reli ability of the hidden file is high, which will not be overlaid by new created file and disk defragment.
We propose a theoretical scheme to generate flux-qubit clusters using XY interactions. In our scheme, two neighboring qubits are coupled via a dc superconducting quantum interference device (SQUID). All flux qubits ar...
详细信息
We propose a theoretical scheme to generate flux-qubit clusters using XY interactions. In our scheme, two neighboring qubits are coupled via a dc superconducting quantum interference device (SQUID). All flux qubits are always biased at their optimal points. The XY interaction can be controlled by the bias current applied to the SQUID for the two coupled qubits with the same resonance frequencies or by the frequency of a microwave pulse applied to the SQUID for the two coupled qubits with unequal resonance frequencies. The generation of a d-dimensional cluster state needs only 2d steps. Existing technology allows us to rapidly modulate the bias current and easily control the frequency of the pulse, and thus our scheme is experimentally feasible.
Measurement-device-independent quantum key distribution (MDI-QKD) is immune to all the detection attacks; thus when it is combined with the decoy-state method, the final key is unconditionally secure, even if a practi...
详细信息
Measurement-device-independent quantum key distribution (MDI-QKD) is immune to all the detection attacks; thus when it is combined with the decoy-state method, the final key is unconditionally secure, even if a practical weak coherent source is used by Alice and Bob. However, until now, the analysis of decoy-state MDI-QKD with a weak coherent source is incomplete. In this paper, we derive, with only vacuum+weak decoy state, some tight formulas to estimate the lower bound of yield and the upper bound of error rate for the fraction of signals in which both Alice and Bob send a single-photon pulse to the untrusted third party Charlie. The numerical simulations show that our method with only vacuum+weak decoy state can asymptotically approach the theoretical limit of the infinite number of decoy states. Furthermore, the statistical fluctuation due to the finite length of date is also considered based on the standard statistical analysis.
暂无评论