Subjects: Other Disciplines >> Synthetic discipline submitted time 2023-03-28 Cooperative journals: 《中国科学院院刊》
Abstract: The carbon neutrality strategy will be the largest orderly human activity in this century, which requires strong scientific supports. This study introduces some key scientific questions and remaining knowledge gaps in earth system science (i.e. atmosphere, land, ocean science), and also discusses some key techniques and the associated challenges, including Earth System Model, climate metrics, greenhouse gasses monitoring techniques, carbon inventories from regional to global scales. On this basis, this study recommends to construct climate monitoring system and platform in China, better describe and understand the earth system coupling processes and mechanisms. To consolidate the techniques for carbon neutrality, this study also suggests to build carbon monitoring and inventory assessment platform and to improve the Earth System Model.
Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-05-20 Cooperative journals: 《计算机应用研究》
Abstract: The lightweight block ciphers can be widely used in various applications, such as smart cities, internet of things and cloud computation and so on, in order to protect data and information secure. Midori is a lightweight block cipher proposed in ASIACRYPT 2015. Its block size has two scenarios, i. e, 64 bits and 128 bit, denoted by Midori64 and Midori128 respectively. Up to now, there are no results about meet-in-the-middle attacks on Midori128. This paper developed a meet-in-the-middle attack on 10-round Midori128 for the first time. Specifically, studying the basic construction and key schedule of Midori128, this paper constructed a 7-round distinguisher on Midori128 by using the differential enumeration and key-dependent sieve techniques. Through appending one round at its top and two rounds at its bottom, this paper mounted a meet-in-the-middle attack on 10-round Midori128. In the attack, time-memory tradeoff technique and some weak subkeys were considered so as to reduce the time complexity of online phase. Finally, the data, time and memory complexities of our attack are 2125 chosen plaintexts, 2126.5 10-round encryptions and 2105 128-bit blocks, respectively.