查询词典 cryptography
- 与 cryptography 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
By well combining the public-key cryptography with Anderson′s public-key steganographic protocol and Eggers′ histogram preserving information embedding method, a new public-key image steganographic scheme is proposed.
将公钥密码技术、Anderson的公钥信息伪装协议和Eggers的直方图保持的数据嵌入方法有机地结合在一起,提出了一种新的公钥图像隐秘通信方案。
-
The Open SSL library uses the included full-strength general-purpose cryptography library, which can be used by itself.
开放的SSL图书馆使用,包括全职实力一般用途的密码学图书馆,可用於本身。
-
The Open SSL library uses the included full-strength general-purpose cryptography library, which can be used by itself.
开放的SSL图书馆使用包括充分强度通用加密库,可用于本身。
-
This paper first describes the fundaments of PKI,including the knowledge of cryptography,the components of PKI,the services provided by PKI,the structure and standards about PKI.
本文首先介绍了基本的PKI概念,包括与PKI相关的密码学知识,PKI的组成和提供的核心服务,PKI的结构框架和相关的各种技术标准。
-
Besides secure multiparty computation, distributed cryptography deals with a lot of special cryptographic computation, for example, bilinear parings/ID-based cryptpgraphic algorithms.
分布式密码不仅仅是个多方计算问题,同时还是具有某些密码特性的密码算法的计算问题。
-
The generating algorithm is derived.It is verified that the GMW PC sequences have balance,optimal auto/cross correlation functions,and very large linear spans and can be used in the CDMA spread spectrum communication and cryptography.
给出了GMW相控序列的生成算法,证明了GMW相控序列均满足平衡性,具有优良的相关特性和极大的线性复杂度,可适用于CDMA扩频通信和保密通信系统中。
-
D k E k (P=P 计算机专业英语 10-17 Chapter 10 Computer and Network Security 10.2 Modern Cryptography- Data Encryption DES has been studied by many of the world's leading cryptographers, but no weaknesses have been uncovered. To crack a DES-encrypted message a hacker or commercial spy would need to try 255 possible keys.
前略为了打开一个DES加密的报文,黑客或商业间谍需要试验前略为了打开一个DES加密的报文, DES加密的报文种可能的密钥, 255种可能的密钥,这种搜索在世界上最快的巨型机上也需好几天的计算机时间。
-
Employing quantum cryptography to transmit the vote from polling stations to central counting house is thus a bit of a publicity stunt.
因此,使用量子加密将选票信息从投票站送往计票中心,也有那么点形象工程的色彩。
-
Quantum cryptography provides confidential communication by sending streams of photons their measurement by the legitimate parties and the subsequent post-processing of the measurement data the result is a cryptic key made up of identical random "bit strings".
量子密码提供保密通信发送的光子流-他们测量的合法政党和随后的后处理测量数据-结果是一个秘密的关键了相同的随机&位串&。
-
Concretely, we assume we have inputs x1,...,xn, where player i knows xi, andwe want to compute f(x1,...,xn)=(y1,...,yn) such that player i is guaranteed to learn yi,but can get nothing more than that.Secure Multiparty Computation protocol is an important area in cryptography.
安全多方计算问题可以用数学定义如下:n个协议参与者{P1,。。。,Pn}执行某个协议π,每个协议参与者提供秘密输入xi,协议π计算函数f(x1,。。。,xn)=(y1,。。。,yn),结果协议参与者Pi应该得到他的结果yi,除此以外,他不应该知道任何其他敏感信息,比如其他参与者的输入。
- 推荐网络例句
-
As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.
每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。
-
Maybe they'll disappear into a pothole.
也许他们将在壶穴里消失
-
But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.
但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。