期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
话说定音鼓 被引量:1
1
作者 刘亚光 《交响(西安音乐学院学报)》 1999年第3期48-49,共2页
鼓类乐器的产生可追溯到遥远的古代,定音鼓也不例外。17世纪以后定音鼓已成为管弦乐队中不可缺少的中坚力量,通常情况下,由四支组成一套。定音鼓最基本的演奏技术有两种——单击和滚奏,表面看似简单,实质上在乐队中举足轻重,具... 鼓类乐器的产生可追溯到遥远的古代,定音鼓也不例外。17世纪以后定音鼓已成为管弦乐队中不可缺少的中坚力量,通常情况下,由四支组成一套。定音鼓最基本的演奏技术有两种——单击和滚奏,表面看似简单,实质上在乐队中举足轻重,具有“副指挥”的作用,因此,对于定音鼓演奏者而言,除了过硬的节奏感,和演奏技术外,最重要的莫过于音乐修养(乐队修养)了。 展开更多
关键词 定音鼓 交响乐队 演奏技术 举击 滚奏
下载PDF
Confidential Procedure Model:a Method for Quantifying Confidentiality Leakage 被引量:1
2
作者 Zhang Yong Li Xiangxue +2 位作者 Zhou Yuan Li Zhibin Qian Haifeng 《China Communications》 SCIE CSCD 2012年第11期117-126,共10页
In this paper, we propose a theoretical-information Confidential Procedure Model (CPM) to quantify confidentiality (or information leakage). The advantages of the CPM model include the following: 1) confidentiality lo... In this paper, we propose a theoretical-information Confidential Procedure Model (CPM) to quantify confidentiality (or information leakage). The advantages of the CPM model include the following: 1) confidentiality loss is formalized as a dynamic procedure, instead of a static function, and described via the "waterfall" diagram; 2) confidentiality loss is quantified in a relative manner, i.e., taken as a quantitative metric, the ratio of the conditional entropy being reserved after observing the entropy of the original full confidential information; 3) the optimal attacks including exhaustive attacks as well as all possible attacks that have (or have not even) been discovered, are taken into account when defining the novel concept of the confidential degree. To elucidate the proposed model, we analyze the information leakage in side-channel attacks and the anonymity of DC-net in a quantitative manner. 展开更多
关键词 CONFIDENTIALITY quantitative analysis perfect secrecy side-channel attack ANONYMITY
下载PDF
New State Recovery Attacks on the Grain v1 Stream Cipher 被引量:1
3
作者 Lin Ding Chenhui Jin +4 位作者 Jie Guan Shaowu Zhang Junzhi Li Hong Wang Wei Zhao 《China Communications》 SCIE CSCD 2016年第11期180-188,共9页
The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key... The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key setting has been found yet. In this paper,new state recovery attacks on Grain v1 utilizing the weak normality order of the employed keystream output function in the cipher are proposed. These attacks have remarkable advantages in the offline time,online time and memory complexities,which are all better than exhaustive key search. The success probability of each new attack is 0.632. The proposed attack primarily depends on the order of weak normality of the employed keystream output function. This shows that the weak normality order should be carefully considered when designing the keystream output functions of Grain-like stream ciphers. 展开更多
关键词 CRYPTANALYSIS grain v1 stream cipher weak normality order
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部