英语人>网络例句>cryptograph 相关的网络例句
cryptograph相关的网络例句

查询词典 cryptograph

与 cryptograph 相关的网络例句 [注:此内容来源于网络,仅供参考]

Random Sequence is very important in cryptographic technology, just as the famous cryptograph ! st Bruce Schneier said: within the six elements of Cryptographic Technology, the generation of Random Sequence is seldom discussed, but it is also important as others.

随机序列在密码技术中是很重要的,正如著名的密码学家Bruce Schneier所说:在密码技术的六个要素中,随机序列的生成是谈论最少的加密要素,不过它也和其它要素一样重要。

Cryptograph of block encryption appear one bit error, whole block cannot comeback.

块加密的密文出现一位错误,整个块都不可能正确解密。

With the development of electronic technique of banks, traditional bill validity check method has been an obstacle because of its low efficiency and bad security. As a result, the electronic payment cryptograph system emerges, and it has been used widely in banks.

随着银行业电子化的发展,传统的银行票据验证方式由于效率低、安全性差,成为制约银行业务发展的一大障碍;于是,电子支付密码系统应运而生,并在银行业被广泛应用。

In this paper, aformal language PEP (principals + environment = protocol ) for the specification of cryptograph is proposed.

加密协议及其形式化分析网络加密协议的目的在于运用加密技术保证开放网络的安全性。

Elliptic curve cryptograph is based on the difficulty of solving discrete logarithm on elliptic curve domain, and therefore it has higher security than other cryptography.

椭圆曲线密码机制是基于椭圆曲线域上求离散对数难度,因此具有更高的安全性。

The cryptography technology based on the private or public key can be used to control the data access and change the straightforward information into the baffling cryptograph information.

基于私有或公共密钥的加密技术可以用来控制数据访问,它将明文消息变换成旁人无法理解的密文消息。

Reliable cryptograph is set up in math and formal computer science. According to the computational theory, the paper expounds mathematical background for public-key cryptosystem including: the complexity of algorithm and problem, relationship between the length of key and security of cryptogram.

可靠的密码学是建立在数学和形式化的计算机科学产生的结论之上的,本文从计算理论的角度阐述了构建对称密码体制所需的数学背景:算法复杂性与问题复杂性的关系;NP问题与密码学的关系;密钥长度与密码安全的关系。

Ad Hoc networks ; Key management ; Identity-based cryptograph system ; Signeryption

Ad Hoc 网络;密钥管理;基于身份的密码体制;签密

This paper first analyses and summarizes the ststus quo and evolution trend of encryption, some common used cryptograph are introduced, including the algorithms used in symmetric cryptosystem and asymmetirc cryptosystem. We describe the theory of each algorithms and compare the elliptic curve cryptosystem with the other two asymmetric cryptosystems to show the advantages of this algorithm. Second, the principle of ECC is discussed, including the math foundation of ECC, basic conception of elliptic curves, constructiong idea of ECC, operation on the elliptic curve and so on. Third, the current attacks of ECC were analyzed deeply, and an algorithm based on limited prime number field was constructed. We analyzed its realizability in theory, and implement it by using certain function of MIRACL software package. Latter half in this paper, the implementation model of a simple elliptic curve encryption system which based on GF has been introduced. The paper also put a deep analysis on the algorithm of point addition and point multiplication.

本文首先对密码技术的发展现状及其发展趋势进行了分析和综述,详细的介绍了私钥密码系统和公钥密码系统的发展,说明各种算法的原理和优缺点,并给出了一些典型的密码体制的简要分析,重点将椭圆曲线算法与其它几种公钥密码算法比较,说明椭圆曲线算法的优势;其次,探讨了椭圆曲线密码体制的原理,包括椭圆曲线密码的数学基础、基本概念、椭圆曲线密码体制的构造思想等问题;第三作者对椭圆曲线的攻击现状作了详细的分析,针对所使用的大素数域F_p,设计了素数域上安全椭圆曲线产生的算法,从理论上做了可实施性分析,从软件上做了具体实现;在本文的后半部分,提出了一个简单的基于有限素数域上的椭圆曲线加密方按算实现模型,并对SECES中设计的点加和点乘运算进行了深入分析。

第3/3页 首页 < 1 2 3
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher