英语人>网络例句>cryptography 相关的网络例句
cryptography相关的网络例句

查询词典 cryptography

与 cryptography 相关的网络例句 [注:此内容来源于网络,仅供参考]

The finite field arithmetic is the base of cryptography and modular inversion is the kernel arithmetic operation.

有限域的运算是密码学的基础,而在有限域的所有运算中模逆运算是最核心也是最复杂的运算。

This article presents some background knowledge, including the symmetric and asymmetric encryption system in cryptography field, the developments of the elliptic curve cryptosystem and PKI.

本文介绍了密码学领域里的对称加密体制和非对称体制、椭圆曲线的发展现状和PKI架构。

There are two basic types of cryptography: asymmetric

有两种基本类型的加密:不对称

At last, the design and implementation of visual cryptography system is completed in this paper.

在前面的研究基础上,本文完成了视觉密码系统的设计与实现。

The results play an important role for the theorerical study and calculation of automorphism group,also for design of decoding algorithm and cryptography system.

本文在文 [4]的基础上对自同构群进行进一步的研究,获得了一些新的结论:a。

Provable Security is a formal method for proving the security of cryptographic schemes, in which the difficulty of breaking a particular scheme is formally related to that of solving a widely believed computational hard problem. Provable security has already become an important theme of theoretical researches in modern cryptography. This dissertation investigates the provable security of public-key encryptions and hybrid encryptions of asymmetric and symmetric encryptions. This includes the various formal security notions and the constructions can be proved to achieve them. Among the constructions, hybrid encryptions are themselves an important way to obtain public-key encryption schemes with chosen ciphertext security. The main results are as follows:(1) The one-wayness of the trapdoor one-way function in NTRU depends on the randomness of the session key, which is different from previous ones. Based on this observation, a new kind of trapdoor one-way function, trapdoor one-way functions with an auxiliary random variable is proposed.

可证明安全性是一种证明密码学方案安全性的形式化方法,它将密码学方案的安全性归约为公认的计算难题,已成为现代密码学领域中理论工作的主线,本文主要研究公钥加密与单双钥混合加密的可证明安全性,这包括它们的各种形式化安全性定义以及达到这些安全性定义的方案构造,而单双钥混合加密本身也是一种构造选择密文安全公钥加密的重要方法,本文得到的主要结果如下:(1)在研究NTRU公钥加密的特殊性基础上,对于公钥加密的陷门单向函数加密模型进行了扩展,提出了具有辅助陷门单向函数的概念,并将其扩展到多元的情况,讨论了可能的密码学用途。

We use symmetrical cryptography, bilinear mapping, hash function, identity-based encryption as basic knowledge tools.

在本文的研究工作中,用到了分组密码、双线性映射、单向散列函数、基于身份的加密等知识工具。

In past years, most of the researches for data protection are focused on increasing the operation speed and bit length of cryptography. This can be used in the embedded system to improve for encryption of output data.

过去在对於嵌入式系统资料安全的保护,大部分的研究致力於改善加密演算法运算位元的长度及运算速度,以增进嵌入式系统对外传输资料加密之安全性。

The cryptanalysis and design of block ciphers are one of the hotspots in modern cryptography.

分组密码的设计与分析是当前密码学研究的热点课题之一。

This paper applies Particle Swarm Optimization algorithm in the cryptology area to design Boolean function in cryptography.

将粒子群(Particle Swarm Optimization,PSO)算法应用于密码学领域,设计密码学中的密码函数—布尔函数。

第3/18页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.

每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。

Maybe they'll disappear into a pothole.

也许他们将在壶穴里消失

But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.

但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。