Computer Science ›› 2022, Vol. 49 ›› Issue (11A): 210900176-5.doi: 10.11896/jsjkx.210900176
• Information Security • Previous Articles Next Articles
LI Hui1, HAN Lin2, TAO Hong-wei3, DONG Ben-song4
CLC Number:
[1]ZHAN X,HONG J.Study on GPU-based password recovery for MS Office2003 document[C]//2012 7th International Confe-rence on Computer Science & Education(ICCSE).IEEE,2012:517-520. [2]LU H.Research on Office Ciphertic Crack Technology Based on CUDA Architecture [D].Zhengzhou:PLA Information Engineering University,2014. [3]HONG J,CHEN Z,HU J.Analysis of encryption mechanism in Office 2013[C]//2015 IEEE 9th International Conference on Anti-counterfeiting,Security,and Identification(ASID).IEEE,2015:29-32. [4]LI J J.Research and Implementation of Document Password Recovery System [D].Chengdu:University of Electronic Science and Technology,2013. [5]LI L P,ZHOU Q L,LI B.Method for implementing Office documentation in multi-core FPGA [J].Small Microcomputer System,2019,40(5):929-934. [6]LI B,ZHOU Q L,SI X M.A new type of mixed beomabileon set recovery system [J].Journal of Computer,2018,41(12):2804-2822. [7]LIU W,ZHENG L,ZHENG K,et al.Method of NSGA-II Parallel and Optimization Based on Nuclear Processor [J].Computer Application Research,2020,37(1):96-101. [8]GU W J,SUN C,WANG B.Research and Application of Parallel Optimization of High Performance Computing Based on OpenAcc [J].Computer Technology and Development,2018,28(4):65-70. [9]DONGARRA J.Report on the Sunway TaihuLight System.University of Tennessee Department of Electrical Engineering and Computer Science Tech:Report UT-EECS16-742[R].2016. [10]MERRILL N.Better Not to Know? The SHA1 Collision & the Limits of Polemic Computation[C]//Proceedings of the 2017 Workshop on Computing Within Limits.2017:37-42. [11]LI L,FANG J,JIANG J,et al.Efficient AES implementation on Sunway TaihuLight supercomputer:A systematic approach[J].Journal of Parallel and Distributed Computing,2020,138:178-189. [12]CHEN D X,LIU X.Design and optimization of the light parallel program of Shenwei Taihu [M/OL].2017.http://www.nsccwx.cn. [13]DONG W Q.Research and Implementation of Scalable Molecular Simulation Algorithm Based on Taihu Lake [D].Changsha:Hunan University,2018. [14]GAO W,LI Y Y,SUN H H,et al.An improved control flow SIMD to quantization method [J].Journal of Software,2017,28(8):2046-2063. [15]ZENG Q M.Research on the key technology of high-throughput rations based on ARMV8 [D].Guangzhou:South China University of Technology,2019. [16]LI L,FANG J,JIANG J,et al.SW-AES:Accelerating AES Algorithm on the Sunway TaihuLight[C]//2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubi-quitous Computing and Communications(ISPA/IUCC).IEEE,2017:1204-1211. |
[1] | HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11. |
[2] | CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112. |
[3] | WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368. |
[4] | SUN Xuan, WANG Huan-xiao. Capability Building for Government Big Data Safety Protection:Discussions from Technologicaland Management Perspectives [J]. Computer Science, 2022, 49(4): 67-73. |
[5] | WANG Qing-xu, DONG Li-jun, JIA Wei, LIU Chao, YANG Guang, WU Tie-jun. Vector Representation and Computation Based Dynamic Access Control in Open Environment [J]. Computer Science, 2022, 49(11A): 210900217-7. |
[6] | LI Hui, HAN Lin, YU Zhe, WANG Wei. Acceleration Method for Multidimensional Function Optimization Based on Artificial Bee Colony Algorithm [J]. Computer Science, 2022, 49(11A): 211200075-6. |
[7] | ZHANG Kang-wei, ZHANG Jing-wei, YANG Qing, HU Xiao-li, SHAN Mei-jing. DCPFS:Distributed Companion Patterns Mining Framework for Streaming Trajectories [J]. Computer Science, 2022, 49(11A): 211100268-10. |
[8] | WANG Jun, WANG Xiu-lai, PANG Wei, ZHAO Hong-fei. Research on Big Data Governance for Science and Technology Forecast [J]. Computer Science, 2021, 48(9): 36-42. |
[9] | YU Yue-zhang, XIA Tian-yu, JING Yi-nan, HE Zhen-ying, WANG Xiao-yang. Smart Interactive Guide System for Big Data Analytics [J]. Computer Science, 2021, 48(9): 110-117. |
[10] | WANG Li-mei, ZHU Xu-guang, WANG De-jia, ZHANG Yong, XING Chun-xiao. Study on Judicial Data Classification Method Based on Natural Language Processing Technologies [J]. Computer Science, 2021, 48(8): 80-85. |
[11] | WANG Xue-cen, ZHANG Yu, LIU Ying-jie, YU Ge. Evaluation of Quality of Interaction in Online Learning Based on Representation Learning [J]. Computer Science, 2021, 48(2): 207-211. |
[12] | TENG Jian, TENG Fei, LI Tian-rui. Travel Demand Forecasting Based on 3D Convolution and LSTM Encoder-Decoder [J]. Computer Science, 2021, 48(12): 195-203. |
[13] | ZHANG Yu-long, WANG Qiang, CHEN Ming-kang, SUN Jing-tao. Survey of Intelligent Rain Removal Algorithms for Cloud-IoT Systems [J]. Computer Science, 2021, 48(12): 231-242. |
[14] | LIU Ya-chen, HUANG Xue-ying. Research on Creep Feature Extraction and Early Warning Algorithm Based on Satellite MonitoringSpatial-Temporal Big Data [J]. Computer Science, 2021, 48(11A): 258-264. |
[15] | GU Shuang-jia, LIU Wan-ping, HUANG Dong. Application of Express Information Encryption Based on AES and QR [J]. Computer Science, 2021, 48(11A): 588-591. |
|