英语人>网络例句>Encryption 相关的网络例句
Encryption相关的网络例句

查询词典 Encryption

与 Encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

Besides, how to achieve fast point multiplication will influence the performance efficiency of the whole encryption system; in this article, for different situations, signed binary method and rolling window method are respectively applied to perform quick operation of elliptic curves point multiplication.

在密码层上实现了基于大素数域GFp=2~(192-2~(64)-1的密钥交换、ELGamal加密和椭圆曲线数字签名。

Therefore, the proposed parallel algorithm can be applied to speed the selection of the base point of the elliptic curve cryptography over GF, improving the speed of encryption and decryption of ECC.

因此该算法可用于椭圆曲线密码(Elliptic Curve Cryptography, ECC)中基点的快速选取,从而提高ECC的加/解密速度。

A new method of finding the points on an elliptic curve by Maple is supplied; Maple is applied to the addition operation, the scalar product operation and the method of seeking the order of a basic point on the elliptic curve are proposed; the applications of Maple on ECC including encryption and decryption are supplied.

利用Maple编程求出椭圆曲线上有理点,用Maple实现椭圆曲线上两点的加法、点的数乘运算及求某个基点阶数的算法,利用Maple实现椭圆曲线密码体制的加密及解密。相比C语言,Maple语言更接近于平时说话的语法。同时,Maple语言可以方便地转化成C语言。

The method this paper discussed was based following theoretic analysis: Square and multiplication of large integer are two basic operations in modular exponential m_ary algorithm. The main operations of m_ary algorithm of point multiplication in elliptic curve encryption were doublings and point addition. The steps of m_ary algorithm in point multiplication was similar to modular exponential.

其基于以下理论分析:模幂m_ary算法的基本运算为大数乘法,其中包括大数平方算法和一般大数乘法;椭圆曲线加密算法中点乘的m_ary算法步骤与模幂的m_ary算法相同,后者的基本运算为倍乘和加法。

This article first introduces the math foundation required by ECC,including the addition rule for elliptic curve point defined over finite field.Then , the principle of ECC is discussed and its security and efficiency of ECC are analyzed.Third, a cryptosystem is designed through analyzing the security requiration, choosing the elliptic curve domain parameters,denoting field element,elliptic curve and elliptic curve point,choosing associate primitves and schemes andpartitioning functional module.Forth, how to develop a crytosystem based on elliptic curve encryption algorithm is investigated.Fifth, a cryptosystem we have developed by us and the testing result is described.

本文首先介绍了ECC的数学基础,对有限域上椭圆曲线点的运算规则进行了详细描述;其次探讨了ECC的原理,分析了ECC的安全性和有效性;第三,设计了一个基于ECC的加密系统,包括系统的安全需求分析,域参数选择,域元、椭圆曲线、点的表示,原语和方案的选择,及整个系统的模块功能划分;第四,在设计的基础上,研究如何开发一个基于椭圆曲线的加密系统;第五,描述了一个我们已经设计与开发的基于椭圆曲线的加密系统,并给出了相应的测试结果。

At first, this paper studies the structure and security situation of electric enterprises information network, then introduces the basic theory of intrusion tolerance. After that, we study the key technology of intrusion tolerance: set up a distributed intrusion detection system model based on mobile agent; study the object replication technology and improve the voting algorithm; analyze and research the elliptic curve encryption system.

论文首先研究了电力企业信息网络结构以及安全现状,接着介绍了入侵容忍的基本理论,然后着重研究了入侵容忍的关键技术:建立了一种基于移动Agent的分布式入侵检测系统模型;研究了对象复制技术,改进了表决算法;分析和研究了椭圆曲线加密体制。

When embedded computer reads the command and data, which could be decrypted by encryption software to revivify the right programme code and resent to the CPU of embedded computer.

安全芯片将Flash存储器与嵌入式计算机其它部件隔离,如同加上一把牢靠的锁,密钥便是这把开锁的钥匙。

Software Description: About iStegano 2005, Encrypt and emboss numerous files into an image, with encryption.

iStegano 2005 使用加密算法加密和加工大量的文件到一幅图像当中。

Since the encipher process and the decipher process are similar to those of encoding and decoding for error-correction, the Complex-Rotary Code may serve the functiens of both data encryption and error-control, an...

由于加密解密过程和纠错编码译码过程类似,复数旋转码可以同时完成数据加密和差错控制功能,从而能够构造出一种包括数据加密、纠错和调制环节的多功能组合式传输器。

The watermark algovithm can resist the physical transfer of printing and scanning by applying techniques such as fixation normalization mutually which can secure the embedding position , chaotic encipher encryption , multipassage embedding and so on .

本文综合运用了归一化相关确定嵌入位置、混沌加密、多通道嵌入等技术,使得本文所设计的水印算法能够抵抗印刷和扫描的物理转换过程,同时本文所采用的水印是二值图像,能够承载大量的信息。

第19/60页 首页 < ... 15 16 17 18 19 20 21 22 23 ... > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。