英语人>网络例句>cryptography 相关的网络例句
cryptography相关的网络例句

查询词典 cryptography

与 cryptography 相关的网络例句 [注:此内容来源于网络,仅供参考]

Binary square and involution of Power Modules algorithms, cryptography is the most important issue.

二进制平方和乘方的幂模算法,是密码学中的重要问题。

In this paper the definition of signcryption KEM is extended in ID-based cryptography. Based on Sakai-Kasahara identity-based key contracture and elliptic-curves-related hard problems, an instance scheme of ID-based signcryption key encapsulation is proposed. Security properties of the proposed scheme are proven with the random oracle model.

在基于身份密码体制上扩展了签密密钥封装的定义,结合Sakai-Kasahara私钥提取结构以及椭圆曲线上相关的困难问题给出了一个基于身份的签密密钥封装的实例方案,并在随机预言机模型下对该实例方案的安全性进行了证明。

Therefore ,they are very important actually to improve the efficiency of decoding so that many people can use this cryptography and strengthen the administration of secret keys so the secret keys can be used conveniently for people and not to be filched lawlessly .

因此,提高解密的效率使加密技术能为更多的人使用和加强密钥管理,使密钥既不被非法窃取又能方便用户的使用,是密码术应用于实际的重要问题。

I hope this small pulpit might help in that endeavor to recognize Merkle's equal contribution to the invention of public key cryptography.

我希望这个小小的讲坛可以帮助我们认识到Merkle对公钥密码学的同等重要的贡献

Using the concept of Boolean functions and combinatorics theory comprehensively, we investigate the construction on annihilators of Boolean functions and the algebraic immunity of symmetric Boolean functions in cryptography:Firstly, we introduce two methods of constructing the annihilators of Boolean functions, Construction I makes annihilators based on the minor term expression of Boolean function, meanwhile we get a way to judge whether a Boolean function has low degree annihilators by feature matrix. In Construction II, we use the subfunctions to construct annihilators, we also apply Construction II to LILI-128 and Toyocrypt, and the attacking complexity is reduced greatly. We study the algebraic immunitiy of (5,1,3,12) rotation symmetric staturated best functions and a type of constructed functions, then we prove that a new class of functions are invariants of algebraic attacks, and this property is generalized in the end.Secondly, we present a construction on symmetric annihilators of symmetric Boolean functions.

本文主要利用布尔函数的相关概念并结合组合论的相关知识,对密码学中布尔函数的零化子构造问题以及对称布尔函数代数免疫性进行了研究,主要包括以下两方面的内容:首先,给出两种布尔函数零化子的构造方法,构造Ⅰ利用布尔函数的小项表示构造零化子,得到求布尔函数f代数次数≤d的零化子的算法,同时得到通过布尔函数的特征矩阵判断零化子的存在性:构造Ⅱ利用布尔函数退化后的子函数构造零化子,将此构造方法应用于LILI-128,Toyocrypt等流密码体制中,使得攻击的复杂度大大降低;通过研究(5,1,3,12)旋转对称饱和最优函数的代数免疫和一类构造函数的代数免疫,证明了一类函数为代数攻击不变量,并对此性质作了进一步推广。

An area efficient modular arithmetic processor was developed that is capable of performing RSA public-key cryptography and other modular arithmetic operations as a coprocessor.

为以较小的面积代价实现RSA公钥密码算法及其他一些算法所需的求模、模加、模乘、模幂等运算,该文设计了一种可作为协处理器使用的模运算处理器。

Secure multiparty computation with its applications is an important direction in current cryptography research field.

安全多方计算及其应用是目前密码学领域的一个重要研究方向。

Studies in Secure Computation and Application The problem of secure multiparty computation is fundamental in cryptography, as well as rel...

安全计算问题是密码学协议研究的基础问题之一,也与很多重要的密码学应用相关。

The main focus of the thesis is the multiple point multiplication algorithm of elliptic curve cryptography.

本文主要研究椭圆曲线密码系统的多点乘算法。

Finite Multiplicative Group In cryptography, we often use the multiplicative finite group: G = in which the operation is multiplication.

有限乘法群在密码学中,我们经常运用乘法有限群:G =,其中的运算是乘法。

第11/18页 首页 < ... 7 8 9 10 11 12 13 14 15 ... > 尾页
推荐网络例句

As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.

每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。

Maybe they'll disappear into a pothole.

也许他们将在壶穴里消失

But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.

但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。