英语人>网络例句>cryptography 相关的网络例句
cryptography相关的网络例句

查询词典 cryptography

与 cryptography 相关的网络例句 [注:此内容来源于网络,仅供参考]

By well combining the public-key cryptography with Anderson′s public-key steganographic protocol and Eggers′ histogram preserving information embedding method, a new public-key image steganographic scheme is proposed.

将公钥密码技术、Anderson的公钥信息伪装协议和Eggers的直方图保持的数据嵌入方法有机地结合在一起,提出了一种新的公钥图像隐秘通信方案。

The Open SSL library uses the included full-strength general-purpose cryptography library, which can be used by itself.

开放的SSL图书馆使用,包括全职实力一般用途的密码学图书馆,可用於本身。

The Open SSL library uses the included full-strength general-purpose cryptography library, which can be used by itself.

开放的SSL图书馆使用包括充分强度通用加密库,可用于本身。

This paper first describes the fundaments of PKI,including the knowledge of cryptography,the components of PKI,the services provided by PKI,the structure and standards about PKI.

本文首先介绍了基本的PKI概念,包括与PKI相关的密码学知识,PKI的组成和提供的核心服务,PKI的结构框架和相关的各种技术标准。

Besides secure multiparty computation, distributed cryptography deals with a lot of special cryptographic computation, for example, bilinear parings/ID-based cryptpgraphic algorithms.

分布式密码不仅仅是个多方计算问题,同时还是具有某些密码特性的密码算法的计算问题。

The generating algorithm is derived.It is verified that the GMW PC sequences have balance,optimal auto/cross correlation functions,and very large linear spans and can be used in the CDMA spread spectrum communication and cryptography.

给出了GMW相控序列的生成算法,证明了GMW相控序列均满足平衡性,具有优良的相关特性和极大的线性复杂度,可适用于CDMA扩频通信和保密通信系统中。

D k E k (P=P 计算机专业英语 10-17 Chapter 10 Computer and Network Security 10.2 Modern Cryptography- Data Encryption DES has been studied by many of the world's leading cryptographers, but no weaknesses have been uncovered. To crack a DES-encrypted message a hacker or commercial spy would need to try 255 possible keys.

前略为了打开一个DES加密的报文,黑客或商业间谍需要试验前略为了打开一个DES加密的报文, DES加密的报文种可能的密钥, 255种可能的密钥,这种搜索在世界上最快的巨型机上也需好几天的计算机时间。

Employing quantum cryptography to transmit the vote from polling stations to central counting house is thus a bit of a publicity stunt.

因此,使用量子加密将选票信息从投票站送往计票中心,也有那么点形象工程的色彩。

Quantum cryptography provides confidential communication by sending streams of photons their measurement by the legitimate parties and the subsequent post-processing of the measurement data the result is a cryptic key made up of identical random "bit strings".

量子密码提供保密通信发送的光子流-他们测量的合法政党和随后的后处理测量数据-结果是一个秘密的关键了相同的随机&位串&。

Concretely, we assume we have inputs x1,...,xn, where player i knows xi, andwe want to compute f(x1,...,xn)=(y1,...,yn) such that player i is guaranteed to learn yi,but can get nothing more than that.Secure Multiparty Computation protocol is an important area in cryptography.

安全多方计算问题可以用数学定义如下:n个协议参与者{P1,。。。,Pn}执行某个协议π,每个协议参与者提供秘密输入xi,协议π计算函数f(x1,。。。,xn)=(y1,。。。,yn),结果协议参与者Pi应该得到他的结果yi,除此以外,他不应该知道任何其他敏感信息,比如其他参与者的输入。

第17/18页 首页 < ... 10 11 12 13 14 15 16 17 18 > 尾页
推荐网络例句

As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.

每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。

Maybe they'll disappear into a pothole.

也许他们将在壶穴里消失

But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.

但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。