英语人>网络例句>cryptography 相关的网络例句
cryptography相关的网络例句

查询词典 cryptography

与 cryptography 相关的网络例句 [注:此内容来源于网络,仅供参考]

Based on the elliptic curve cryptography and Shamir threshold mechanism, an anti-deception threshold signature scheme is proposed.

基于椭圆曲线密码体制,利用shamir的门限机制,提出了一种可以防欺诈的门限签名方案。

In the cryptography research, the paper also educes a series of singular nonlinear feedback functions which can produce another kind of regular sequences; in the addition, the paper points out the forge signature attack about a kind of threshold digital signature scheme, gives the example and mend measure Secondly, the paper introduces the whole design of the monitoring master, which consists of master and slave principle, modules adopted and the module parameters, circuit diagram designed and so on.

其次,对监控座机的整体设计进行了描述,包括座机系统的工作原理、各个组成部分模块的选择及工作线路设计等,也附带介绍了蓝牙子机设计中采用的工作模式。

In cryptography,a cipher produced by a composition of a number of substitution and transposition cipher s.

密码学中,由替代密码和置换密码结合使用而构成的一种密码。

Transposition is one of two methods used for encryption and cryptography.

移项是加密和解密中使用的两种方法之一。

Creating a Transposition Table - Transposition is one of two methods used for encryption and cryptography.

移项是加密和解密中使用的两种方法之一。

In this paper, we proposed an unexpanded visual cryptography method for gray-level images.

此外,大部分的视觉密码研究都是关於黑白影像的,而较少关於灰阶影像的研究。

From the viewpoint that the size of the image reconstructed is changed or not, visual cryptography schemes can be calculated into pixel expanded schemes and pixel unexpanded schemes.

从恢复出的图像大小是否发生变化来看,视觉密码方案分为像素扩展的密码方案和像素不扩展的密码方案。

That's why they resorted to cryptography methods in order to save the texts of the problems from an unsanctioned reading.

所以他们对邮件进行加密使别人无法在未经许可的情况下阅读邮件。

Verifiable secret sharing is a very important tool in cryptography and information security.

可验证秘密分享是密码学和信息安全中的一个重要工具。

This thesis includes eight chapters: chapter 1 introduces the development background and target; chapter 2 expatiates the primary algorithms of cryptography; chapter 3 explains feasibility research report; chapter 4 shows the requirement analysis report; chapter 5 summarizes the preliminary design report; chapter 6 includes detailed design report and partial source codes; chapter 7 discusses the software testing report; chapter 8 acquires a whole-length summarization.

本文共分为8章:第1章介绍密码学综合实验系统的开发背景与目标;第2章阐述了密码学的主要加解密算法及原理;第3章为该系统的可行性研究报告;第4章是需求分析报告;第5章叙述了系统的概要设计;第6章介绍了系统的详细设计及部分编码;第7章为该系统的软件测试报告;第8章是对全文的总结。

第13/18页 首页 < ... 9 10 11 12 13 14 15 16 17 ... > 尾页
推荐网络例句

As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.

每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。

Maybe they'll disappear into a pothole.

也许他们将在壶穴里消失

But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.

但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。