英语人>网络例句>cryptographic 相关的网络例句
cryptographic相关的网络例句

查询词典 cryptographic

与 cryptographic 相关的网络例句 [注:此内容来源于网络,仅供参考]

It allows you to exchange symmetrically encrypted information between MSCCrypto and various cryptographic applications in binary and armored form.

它可以让您交换对称加密信息之间的msccrypto和各种加密应用在二元和装甲的形式。

It also includes hardware support for cryptographic tokens and biometric devices, such as thumbprint scanners.

它也包括对加密令牌和生物测定设备的硬件支持,如指纹扫描仪。

One important aspect of the cryptographic algorithms localization is to eliminate the suspicion of a trapdoor.

密码算法本土化的一个重要方面是消除密码算法存在陷门的忧虑。

This implies that the truncated 256 bit hash the same cryptographic security as the 128 bit hash.

这意味着,被截断的256位散列一样的128位散列加密的安全性。

Cryptographic protocol is one of the important ways of constructing safe internet environment and protecting the safety of information systems. However, it is very difficult to analyze its limitation and unclose the intrusion.

密码协议是构建网络安全环境、保护信息系统安全的重要手段之一,然而分析其固有缺陷和揭示入侵攻击行为,却是一件非常困难的事情。

Private: Adeona uses state-of-the-art cryptographic mechanisms to ensure that the owner is the only party that can use the system to reveal the locations visited by a device.

另外,如果用户的笔记本电脑中有一个内置摄像头的话,Adeona软件会指示摄像头每隔30秒左右拍一张照片。

This dissertation investigates the construction of pseudo-random sequences (pseudo-random numbers) from elliptic curves and mainly analyzes their cryptographic properties by using exponential sums over rational points along elliptic curves. The main results are as follows:(1) The uniform distribution of the elliptic curve linear congruential generator is discussed and the lower bound of its nonlinear complexity is given.(2) Two large families of binary sequences are constructed from elliptic curves. The well distribution measure and the correlation measure of order k of the resulting sequences are studied. The results indicate that they are "good" binary sequences which give a positive answer to a conjecture proposed by Goubin et al.(3) A kind of binary sequences from an elliptic curve and its twisted curves over a prime field F_p. The length of the sequences is 4p. The "1" and "0" occur almost the same times. The linear complexity is at least one-fourth the period.(4) The exponential sums over rational points along elliptic curves over ring Z_ are estimated and are used to estimate the well distribution measure and the correlation measure of order k of a family of binary sequences from elliptic curves over ring Z_.(5) The correlation of the elliptic curve power number generator is given. It is proved that the sequences produced by the elliptic curve quadratic generator are asymptotically uniformly distributed.(6) The uniform distribution of the elliptic curve subset sum generator is considered.(7) We apply the linear feedback shift register over elliptic curves to produce sequences with long periods. The distribution and the linear complexity of the resulting sequences are also considered.

本文研究利用椭圆曲线构造的伪随机序列,主要利用有限域上椭圆曲线有理点群的指数和估计讨论椭圆曲线序列的密码性质——分布、相关性、线性复杂度等,得到如下主要结果:(1)系统讨论椭圆曲线-线性同余序列的一致分布性质,即该类序列是渐近一致分布的,并给出了它的非线性复杂度下界;(2)讨论两类由椭圆曲线构造的二元序列的&良性&分布与高阶相关性(correlation of order κ),这两类序列具有&优&的密码性质,也正面回答了Goubin等提出的公开问题;(3)利用椭圆曲线及其挠曲线构造一类二元序列,其周期为4p(其中椭圆曲线定义在有限域F_p上),0-1分布基本平衡,线性复杂度至少为周期的四分之一;(4)讨论了剩余类环Z_上的椭圆曲线的有理点的分布估计,并用于分析一类由剩余类环Z_上椭圆曲线构造的二元序列的伪随机性;(5)讨论椭圆曲线-幂生成器序列的相关性及椭圆曲线-二次生成器序列的一致分布;(6)讨论椭圆曲线-子集和序列的一致分布;(7)讨论椭圆曲线上的线性反馈移位寄存器序列的分布,线性复杂度等性质。

In the study of cryptographic protection to data, a comprehensive cryptographically data protection architecture is present and implemented after analyzing the characteristics in enterprise application.

在对数据的密码学保护方面,根据动态联盟的不同企业间进行协同工作过程中对安全保障体系的各种要求,建立了一个综合的数据密码学保护体系。

It provides a security framework that includes cryptographically signed modules to present an abstracted unified API to the application developer to perform cryptographic and security related operations.

它提供了一个安全框架,包括加密符号模块,为应用程序开发人员提供了一个抽象的统一的API以执行加密和安全操作。

UCSA maps each symbolic cryptographic operation in Dolev-Yao model to an ideal functionality in the UC framework, resulting in simpler proofs for cryptographically soundness at the same time.

UCSA框架将Dolev-Yao模型中密码学抽象操作与UC框架中的理想功能进行了结合,使得通过形式化分析方法可以证明安全协议的在密码学环境下的一些性质。

第8/11页 首页 < ... 3 4 5 6 7 8 9 10 11 > 尾页
推荐网络例句

Researches reveal that students who suffer from corporal punishment tend to resort to violence in their future life.

研究表明遭受过肉体惩罚的孩子倾向于在他们今后的人生中使用暴力。

Total sugar of sarcocarp and chlorophyll of pericarp increased firstly, and then decreased afterward along with altitude; Titratable acidity, ascorbicacid and anthocyanin of pericarp were increased along with altitude; The content of protein increased firstly and decreased afterward along with altitude; Carotenoid of pericarp were decreased along with altitude.

果肉总糖和果皮叶绿素含量随海拔高度升高先升高后降低;可滴定酸、维生素C和果皮花青苷含量均随海拔升高而升高;蛋白质在1720m处最大,1420m处最小;果皮类胡萝卜素随海拔升高而降低。

I ' m too tired to go farther.

我太累了走不动了。