英语人>网络例句>encryption 相关的网络例句
encryption相关的网络例句

查询词典 encryption

与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

In this paper, we propose a new visual cryptographic method for gray-level and chromatic images without pixel expansion. We simultaneously encrypt m successive pixels (called an "encryption sequence") each time in accordance with two basis matrices. In every m encryption sequences with b blacks, we make sure that b encryption sequences are encoded by black basis matrix, and the other ones are encoded by white basis matrix.

本研究提出一种不需要像素扩展的灰阶和彩色视觉密码的技术;我们的方法利用多点同时加密的概念,每次取连续的 m 个点做为加密序列进行加密,我们的方法可以确保在 m 个具有 b 个黑点的加密序列中,一定会有 b 个加密序列是使用黑点基础矩阵加密,另外的个则使用白点基础矩阵加密,因此在叠合影像上黑与白的变化很规律。

Chaper 3 is general description of ADA encryption. Chapter 4 deals with the transform domain encryption. Includes the element of perfect and quasi-perfect transform domain encryption, and presents two type new schemes. Chapter 5 deals with asynchronous ADA encryption. Extends the general theory and model of asynchronous ADA scrambling, and introduces two type phase-distortion-free a synchronous ADA schemes. Chapter 6 is about new direction of ADA encryption. Includes TASI scrambling, transform domain dummy insertion scrambling, noise coving scrambling and other multi-dimension ADA scrambling, and proposes an adaptive dummy spectrum insertion asynchronous scrambling and a new adaptive noise-coving DFT scrambling algorithm. Chapter 7 is on permutation key. presents part results on permutation features, selecting criterion and constructing method. Chapter 8 introduces the hard and software design of a common ADA encryption/decryption system, and presents the experimental results on several proposed ADA encryption schemes.

第一章为绪论;第二章为语声信号、及其处理基础;第三章为模数模加密的一般描述;第四章为变换域加密研究,包括变换域加密机理,变换域完善与准完善保密研究,提出两种新的变换域加密方案;第五章为异步模数模加密研究,扩充了异步模数模加密的一般理论,介绍了两种新的无相位失真异步加密方案的原理与实现方法;第六章对模数模加密新方向:TASI应用途径、变换域伪谱插空置乱、噪声掩盖、多维置乱加密的原理和方法进行介绍,提出了自适应伪频插空异步模数模置乱算法与自适应DFT系数噪声掩盖置乱新算法;第七章为置换密钥性质、筛选准则以及构造方法研究的部分结果;第八章介绍了通用模数模加/解密实验系统的硬件、软件研制概况,并给出了几种加密方法的实验结果。

Encryption Algorithm simple description : DES is a block cipher algorithm, his 64 for a pair of data encryption Encryption algorithm principle :The password system may divide into 2 big kinds from the principle, namely single key password system and double key password system.

加密算法的简单描述:DES是一种分组加密算法,他以64位为分组对数据加密。加密算法的原理:密码体制从原理上可分为2大类,即单钥密码体制和双钥密码体制。

The main task of this article contains:compares algorithm and encryption and decryption between the widely-used public key encryption system RSA and ECC;(2) directing against present elliptic curve attack algorithm, uses SEA algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve"s ELGamal encryption and decryption and digital signature;(3) discusses elliptic curve"s application on smart card and proposes two identification plans based on EEC.

2针对目前已有的椭圆曲线攻击算法,使用SEA算法实现了安全椭圆曲线的选取,实现了基于大素数域上的椭圆曲线的ELGamal加解密和数字签名。(3)讨论了椭圆曲线在智能卡上的应用,并提出了两种基于ECC的身份认证方案。

First, the paper proves the well-posedness of the encryption and decryption problems, which provides theoretical bases for experiments of encryption and decryption; Then presents a fast iterative algorithm, which is proposed based on the special sparse structure of the coefficient matrix of the two-dimensional C-N difference scheme, and successfully experiments on images encryption and decryption; At the end, the security of the methods of images encryption and decryption based on the two-dimensional Pseudo -parabolic Partial Differential Equation is experimented and discussed particularly.

首先证明了基于二维连续模型的加、解密问题是适定的,为加、解密实验提供了理论依据;然后根据模型的二维C-N格式系数矩阵的特殊稀疏结构,给出快速迭代求解算法,并成功地进行了图像加、解密的数值试验;最后对基于二维伪抛物型方程的图像加、解密方法的安全性进行了详细的试验讨论。

Current market software encryption key : soft encryption, disk encryption keys, encryption cards and encryption software dog.

目前市场上软件的加密方法主要有:软加密、钥匙盘加密、加密卡和软件狗加密。

Software Description: About Vigilant File Encryption Software, This allows you to encrypt, sign or shred files, e-mail, documents, folders and Hippa data.

Vigilant File Encryption Software 这允许你加密,签署或者切碎文件,电子邮件,文件,文件夹和 Hippa 数据。

Active attack cryptanalysis based and fully scalable FGS encryption algorithm Aimed to the weakness of the current selective encryption algorithms in the sense of cryptanalysis, we design a active spacial—temporal correlation attack scheme and propose a both encryption strategies on base-layer and enhancement-layer. Not only the general FGS stream encryption is dealt with but also the case of FGST (fine granularity sealable temporal) is also well addressed.

2基于主动攻击安全的充分可扩展FGS加密算法针对目前压缩视频流加密算法所经常采用的选择加密方法,通过进行主动时域、空域相关性攻击,指出该类算法存在的问题,包括对于FGS基本层单独加密的安全分析,然后设计实现了基本层和增强层同时加密的安全策略,为保证FGS充分可扩展功能,算法同时还支持细粒度时域可扩展编码FGST(fine granularity scalable temporal)的情况。

In the symmetrical encryption system aspect, discussed the des algorithm with emphasis, has given it in the key management, the safe application aspect exists question; the problem which in the asymmetrical encryption system aspect, studies in with emphasis which rsa and the application has the question, the ecc merit and should pay attention and so on.through the quite symmetrical key encryption system and the public key encryption system good and bad points,summarize should use the mix key encryption system in the electronic commerce, both guarantee data security, and may enhance encrypts and deciphers the speed.

在对称加密体制方面,重点讨论了des 算法,给出了其在密钥管理、安全应用方面存在的问题;在非对称加密体制方面,重点研究rsa及其应用中存在的问题、ecc的优点及应注意的问题等。通过比较对称密钥加密体制和公开密钥加密体制的优缺点,总结出在电子商务中应采用混合密钥加密体制,既保证数据安全,又可提高加密和解密速度。

First of all, the structure from the message, the message is divided into 3 parts: the first message, at the style, MAC address, so that packet transmission to reach the safety of the international financial sector standards; Secondly, the encryption method from the point of view, this The most prominent of the two systems were encrypted administrator password is encrypted on the card to encrypt passwords, especially for card encryption, the use of soft encryption service interface technology, using the work key, master key, the original password through the ciphertext key algorithm through two different DES encryption key to come up, we can imagine, I want to work at the same time key, master key, the text of the original secret password to a more difficult task, If the re-solution of the two DES, can be said to be completely impossible!

首先从报文结构上来看,报文分为3部分:报文头、报文体、MAC地址,使报文传输的安全性达到了国际金融行业的标准;其次,从加密方式来看,本次系统最突出的两个加密分别是对管理员密码进行加密、对卡密码进行加密,特别是对卡密码的加密,运用的是软加密服务接口技术,运用工作密钥,主密钥,原始密码通过算法得到密钥密文通过两次不同的DES加密才得出的密钥,可想而知,想要同时得到我的工作密钥,主密钥,原始密码密文本来就比较困难了,要是再解两次DES,可以说是完全不可能实现的!

第1/60页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

I use an example quoted by Hu Jiaqi:"It is reported that America separates the DNA of a kind of virus by making use of genetic technology and combines it with another kind of DNA. Finally, they get a kind of virulent biological agent called a "pyrotoxin". Someone discloses in private that 20 grams of such a kind of biological agent could result in the global death of 6 billion people due to infection."

我在这里例举胡家奇所引用过的例子:"据报道,美国利用转基因技术,将一种病毒的DNA分离出来,与另外一种DNA进行结合,拼结成一种剧毒的"热毒素"生物战剂,且私下有人透露,这种生物战剂只需20克,就可以导致全球60亿人全部感染死亡。"

Waiting, for the queers and the coons and the Reds and the Jews.

等待着疯子和黑人还有红色共产主义者还有犹太人

"Everybody talks about what a horrible job it is to brief the press,but I love these briefings!"

&每个人都说,简报新闻是一份多么糟糕的工作,,但是我爱这些简报。&