英语人>网络例句>key signature 相关的网络例句
key signature相关的网络例句

查询词典 key signature

与 key signature 相关的网络例句 [注:此内容来源于网络,仅供参考]

The pupose of the research is to develops public key encryption and digital signature shemes based on matrix canonical decomposition problem, or matrix diagonalization problem over Z/n, the ring of integers with modulo-n addition and multiplication in particular, where n is an RSA modulus.

本课题研究基于矩阵经典分解问题,特别是Z/n上矩阵对角化问题的公钥密码与数字签名算法,其中n是一个RSA模数。新算法采用由一个矩阵多项式构成的多维单向陷门函数,其单向性由矩阵对角分解问题(即通过相似变换将矩阵化为对角型的问题)的复杂性来保障,对该函数求逆的陷门由矩阵的特征值或特征向量提供。

In this paper we firstly discuss the general concepts of compter security and cryptology, and then describe the mostly used modern encryption methods and technologies. We detail the advantages and disadvantages of symmetric algorithm, public-key algorithm and one-way hash function. At last we put forward a new block cipher - permutation code, and describe the secret hash digital signature and online electronic contracting with the trusted third party system.

本文首先讨论计算机安全和密码学的一般概念,然后介绍现代加密手段常用的方法和技术,详细讨论了对称加密方法、公开密钥加密方法和单向散列加密方法的优点和不足,进而提出了一种新型的分组加密算法—排列码加密算法,并在此基础上实现了保密散列数字签名算法和有可信第三方参与的网上电子签约。

In this article, the fundamental knowledge of cryptography are introduced first. The author introduces the message digest algorithm, digital signature and X.509 certificate which are the foundations of authentication in public-key systems.

本文首先介绍了密码学方面的基础知识,接着介绍了身份认证中的消息摘要算法和数字签名的原理以及X.509证书,这些是公钥加密体系中身份认证的基础。

Second, we design and implementation the tax-controlled system and whole security of data of the system. We integrate application the encrypted algorithms technology, digital signature, key managing and digital digest, etc. And combine such hardware equipment as CPU card and POS machine, has solved the systematic security wholly.

然后对税控系统的整体系统及整体安全性进行设计与实现,综合应用密码技术、数字签名、密钥管理和数字文摘等,结合CPU 卡和税控器等硬件设备,整体解决了税控系统的安全性。

How to protect the CA signature private key is a key problem in CA system security.

是否能对CA的签名私钥进行有效的保护是CA系统安全的关键问题。

Rather, it is a signature and encryption key that corresponds to a second key stored in your computer.

确切地说,这是一个签名和加密密钥,与你的计算机上存储的第二个密钥相对应。

The private key is used in the signing process, and the public key isused to verify the signature.

私钥是使用在签名过程中,公钥是用来核实签名的。

The group public key, member抯 secret key, and signature are all of constant size.

群组的公开钥、成员的秘密钥及签名的长度都是固定不变的。

The basic Diffie-Hellman key exchange scheme does not provide authentication. Harn proposed a digital signature scheme for Diffie-Hellman key exchange system.

本章第七节,对HMP方案,设计一种已知明文的伪造攻击方法,得出结论,当HMP方案的设计中所选用的单向函数是同态函数时这种方案是不安全的。

The scheme has the structure of hierarchical PKGs, so a lowerlevel PKG can share the workload of secret information generation and identity authentication with a higherlevel PKG. At the same time the scheme has the property of proactive security, that is, the whole lifetime of signature is divided into several time periods, and the shares of private key need to be renewed in each time period. However, new shares can construct the same private key as old shares.

方案具有分层的PKG结构,低层PKG可以分担高层PKG的秘密信息产生和身份认证的任务;同时具有动态安全的特性,将签名的整个生命周期分成若干时间段,每个时间段都对密钥份额进行更新,更新后的份额重构的密钥保持不变。

第4/9页 首页 < 1 2 3 4 5 6 7 8 9 > 尾页
推荐网络例句

Objective To investigate the effects of interleukin-1 β converting enzyme gene on the biologic characteristics of ovarian cancer cells.

目的 探讨白细胞介素-1 β转换酶的表达,对卵巢癌细胞生物学特性的影响。

Campylobacter: This illness is the most commonly identified cause of diarrheal illness in the world.

弯曲:这种病是最常见的原因查明腹泻病,在世界上。

Gangs fill the daily lives of many of our poorest and most vulnerable citizens with a terror that the court does not give sufficient consideration, often relegating them to the status of prisoners in their own homes.

法院没有充分的考虑到黑社会的猖獗所带来的恐怖,这使得我们最穷、最可怜的市民每天生活在他们的阴影当中,成为在家的囚犯。