查询词典 cryptography
- 与 cryptography 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Binary square and involution of Power Modules algorithms, cryptography is the most important issue.
二进制平方和乘方的幂模算法,是密码学中的重要问题。
-
In this paper the definition of signcryption KEM is extended in ID-based cryptography. Based on Sakai-Kasahara identity-based key contracture and elliptic-curves-related hard problems, an instance scheme of ID-based signcryption key encapsulation is proposed. Security properties of the proposed scheme are proven with the random oracle model.
在基于身份密码体制上扩展了签密密钥封装的定义,结合Sakai-Kasahara私钥提取结构以及椭圆曲线上相关的困难问题给出了一个基于身份的签密密钥封装的实例方案,并在随机预言机模型下对该实例方案的安全性进行了证明。
-
Therefore ,they are very important actually to improve the efficiency of decoding so that many people can use this cryptography and strengthen the administration of secret keys so the secret keys can be used conveniently for people and not to be filched lawlessly .
因此,提高解密的效率使加密技术能为更多的人使用和加强密钥管理,使密钥既不被非法窃取又能方便用户的使用,是密码术应用于实际的重要问题。
-
I hope this small pulpit might help in that endeavor to recognize Merkle's equal contribution to the invention of public key cryptography.
我希望这个小小的讲坛可以帮助我们认识到Merkle对公钥密码学的同等重要的贡献
-
Using the concept of Boolean functions and combinatorics theory comprehensively, we investigate the construction on annihilators of Boolean functions and the algebraic immunity of symmetric Boolean functions in cryptography:Firstly, we introduce two methods of constructing the annihilators of Boolean functions, Construction I makes annihilators based on the minor term expression of Boolean function, meanwhile we get a way to judge whether a Boolean function has low degree annihilators by feature matrix. In Construction II, we use the subfunctions to construct annihilators, we also apply Construction II to LILI-128 and Toyocrypt, and the attacking complexity is reduced greatly. We study the algebraic immunitiy of (5,1,3,12) rotation symmetric staturated best functions and a type of constructed functions, then we prove that a new class of functions are invariants of algebraic attacks, and this property is generalized in the end.Secondly, we present a construction on symmetric annihilators of symmetric Boolean functions.
本文主要利用布尔函数的相关概念并结合组合论的相关知识,对密码学中布尔函数的零化子构造问题以及对称布尔函数代数免疫性进行了研究,主要包括以下两方面的内容:首先,给出两种布尔函数零化子的构造方法,构造Ⅰ利用布尔函数的小项表示构造零化子,得到求布尔函数f代数次数≤d的零化子的算法,同时得到通过布尔函数的特征矩阵判断零化子的存在性:构造Ⅱ利用布尔函数退化后的子函数构造零化子,将此构造方法应用于LILI-128,Toyocrypt等流密码体制中,使得攻击的复杂度大大降低;通过研究(5,1,3,12)旋转对称饱和最优函数的代数免疫和一类构造函数的代数免疫,证明了一类函数为代数攻击不变量,并对此性质作了进一步推广。
-
An area efficient modular arithmetic processor was developed that is capable of performing RSA public-key cryptography and other modular arithmetic operations as a coprocessor.
为以较小的面积代价实现RSA公钥密码算法及其他一些算法所需的求模、模加、模乘、模幂等运算,该文设计了一种可作为协处理器使用的模运算处理器。
-
Secure multiparty computation with its applications is an important direction in current cryptography research field.
安全多方计算及其应用是目前密码学领域的一个重要研究方向。
-
Studies in Secure Computation and Application The problem of secure multiparty computation is fundamental in cryptography, as well as rel...
安全计算问题是密码学协议研究的基础问题之一,也与很多重要的密码学应用相关。
-
The main focus of the thesis is the multiple point multiplication algorithm of elliptic curve cryptography.
本文主要研究椭圆曲线密码系统的多点乘算法。
-
Finite Multiplicative Group In cryptography, we often use the multiplicative finite group: G = in which the operation is multiplication.
有限乘法群在密码学中,我们经常运用乘法有限群:G =,其中的运算是乘法。
- 推荐网络例句
-
On the other hand, the more important thing is because the urban housing is a kind of heterogeneity products.
另一方面,更重要的是由于城市住房是一种异质性产品。
-
Climate histogram is the fall that collects place measure calm value, cent serves as cross axle for a few equal interval, the area that the frequency that the value appears according to place is accumulated and becomes will be determined inside each interval, discharge the graph that rise with post, also be called histogram.
气候直方图是将所收集的降水量测定值,分为几个相等的区间作为横轴,并将各区间内所测定值依所出现的次数累积而成的面积,用柱子排起来的图形,也叫做柱状图。
-
You rap, you know we are not so good at rapping, huh?
你唱吧,你也知道我们并不那么擅长说唱,对吧?