期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
搜索秩序 被引量:5
1
作者 金兼斌 《现代传播(中国传媒大学学报)》 CSSCI 北大核心 2005年第5期86-88,共3页
本文从当下盛行的各种排名或排行榜切入,关注新媒体传播时代搜索引擎的重要性。文章首先通过历时性的考察,指出了搜索引擎对于互联网发展的重要意义。然后,通过对著名统计排名网站Alexa排名机制的揭示,以及对Google、百度这两个最常用... 本文从当下盛行的各种排名或排行榜切入,关注新媒体传播时代搜索引擎的重要性。文章首先通过历时性的考察,指出了搜索引擎对于互联网发展的重要意义。然后,通过对著名统计排名网站Alexa排名机制的揭示,以及对Google、百度这两个最常用的搜索引擎排名原理的比较,指出每一个搜索引擎都有自己的算法和算法设计中的“价值取向”。本文由此认为,信息时代的人们,应该像学会走路一样训练自己对信息的获取、利用甚至分析、评价的能力,这是一种基本的信息素养。而搜索能力是信息素养中非常重要的一方面。 展开更多
关键词 搜索引擎 秩序 信息压缩技术 互联网 创新扩散理论 搜索秩序
下载PDF
New State Recovery Attacks on the Grain v1 Stream Cipher 被引量:1
2
作者 Lin Ding Chenhui Jin +4 位作者 Jie Guan Shaowu Zhang Junzhi Li Hong Wang Wei Zhao 《China Communications》 SCIE CSCD 2016年第11期180-188,共9页
The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key... The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key setting has been found yet. In this paper,new state recovery attacks on Grain v1 utilizing the weak normality order of the employed keystream output function in the cipher are proposed. These attacks have remarkable advantages in the offline time,online time and memory complexities,which are all better than exhaustive key search. The success probability of each new attack is 0.632. The proposed attack primarily depends on the order of weak normality of the employed keystream output function. This shows that the weak normality order should be carefully considered when designing the keystream output functions of Grain-like stream ciphers. 展开更多
关键词 CRYPTANALYSIS grain v1 stream cipher weak normality order
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部