英语人>网络例句>密文 相关的搜索结果
网络例句

密文

与 密文 相关的网络例句 [注:此内容来源于网络,仅供参考]

The realization of this procedure des plus decryption functions, each of the 64 encrypted ciphertext, thus achieving all of the increase in declassified documents.

本程序的实现des加解密的功能,每次对64位的密文进行加密,从而实现对所有的文件的加解密。

We prove that in the decision-making bilinear Diffie-Hellman problem difficult to resolve under the assumption that the new proposal for adaptive chosen ciphertext attack is safe.

我们证明了在决策双线性Diffie- Hellman问题难解的假设下,新提出的方案对自适应选择密文攻击是安全的。

For any given ciphertext, the corresponding plaintext can be found in less than 2^19 operations over a finite field of size 2^8 by linearization equation attack.

对于给定的合法密文,可以利用一阶线性化方程攻击方法在2^19个2^8域上的运算内找到了其相应的明文。

Two kinds of differential for the cryptanalysis of SFAER\|64 are introduced to form the differential pair .

针对SARER 64密码系统给出了两种形式的差分构成混合差分对,研究了差分对与密文对分布的关系。

Communication manager, which is established in the connection of TCP by cryptogram, can transmit.

通信管理器是用密文方式建立在TCP连接上的传输。

A cryptogram breaking program can be thought of a

密文打破程序可以被看作两个合作项目。

Meanwhile, it is easy to discover cryptograph by traditional encryption technology by attacker and it affects security of information.

同时,传统的加密技术所得到的密文容易被攻击者发现,影响了信息的安全性。

Cryptograph of block encryption appear one bit error, whole block cannot comeback.

块加密的密文出现一位错误,整个块都不可能正确解密。

By introducing the selective identity and selective chosen message attack model, this paper proved unforgeability of the scheme under the hardness of DHI problem and its indistinguishability against selective identity and chosen ciphertext attack under the hardness of DBDHE problem.

通过引入了选择身份和选择消息攻击的安全模型,利用DHI问题的困难性,证明了方案的不可伪造性,同时利用DBDHE问题的困难性,证明了方案在选择身份和选择密文攻击下的不可区分性。

The S box was constituted with the multiplication inverse element affined transformation in GF(2) of all elements of limited field GF(28),with S box s nonlinear byte changed,ciphered text attained the ideal status of the even of difference and the linear of deviation,and increased the capability of the AES algorithm of anti beating the difference cipher of analysis and linear cipher of analysis.

S盒由有限域G F(28)上所有元素的乘法逆元及在域G F(2)上的仿射变换构成,经过S盒的非线性字节代换,密文的差分均匀性和线性偏差都达到较理想的状态,提高了A E S算法抗击差分密码分析及线性密码分析的能力。

第5/12页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher