英语人>网络例句>cryptology 相关的网络例句
cryptology相关的网络例句

查询词典 cryptology

与 cryptology 相关的网络例句 [注:此内容来源于网络,仅供参考]

This paper applies Particle Swarm Optimization algorithm in the cryptology area to design Boolean function in cryptography.

将粒子群(Particle Swarm Optimization,PSO)算法应用于密码学领域,设计密码学中的密码函数—布尔函数。

Information Theory and Coding is one of the basic courses of the major Communication and Cryptology.

信息论与编码是通信/密码学类专业的一门基础课程。

Modular design is a common approach for dealing with complex tasks in modern cryptology; in which the main problem is that the secure sub-protocols no longer remain their security in the hybrid protocol. Canetti presents universally composable security framework for designing secure hybrid protocol.

协议模块化设计是协议设计领域的重要研究方向,其中最大的困难是子协议的安全性并不能保证组合协议的安全性。

In this paper we firstly discuss the general concepts of compter security and cryptology, and then describe the mostly used modern encryption methods and technologies. We detail the advantages and disadvantages of symmetric algorithm, public-key algorithm and one-way hash function. At last we put forward a new block cipher - permutation code, and describe the secret hash digital signature and online electronic contracting with the trusted third party system.

本文首先讨论计算机安全和密码学的一般概念,然后介绍现代加密手段常用的方法和技术,详细讨论了对称加密方法、公开密钥加密方法和单向散列加密方法的优点和不足,进而提出了一种新型的分组加密算法—排列码加密算法,并在此基础上实现了保密散列数字签名算法和有可信第三方参与的网上电子签约。

This paper briefly introduce basic knowledge of cryptology and method of cryptography and cryptanalysis in classical cryptology by using the number theory in mathematics.

本文通过使用数学中的数论知识,浅要介绍了密码学的基本知识以及传统密码学中的加密,解密方法。

Based on these, we construct a class of nonlinear sequence generators, show that they have better cryptographical properties, and furthermore they can resist on the attack of cipher by cryptology analysis So they can be used as key sequence generators..

在此基础上自主设计了一类非线性序列生成器,证明了其具有良好的密码学性质,并且通过密码分析,表明它能抵抗现有的几种密码攻击,因此这类非线性序列适于做密钥流生成器。

More and more people have taken high attention to cryptology.

数据加密技术的研究也越来越受到人们的重视。

In chapter three, the systems and technologies of cryptology used in this thesis are presented in detailed.

第三章详细地介绍了本文中用到的密码体制和技术。

This thesis is composed of following parts: the fundamental theory of the modern cryptology is briefly researched, in which the mathematic model of cryptology, data encrypt principle and Galois field theory related with elliptic curve crypto is discussed.

研究了现代密码学相关的基本理论,介绍了密码系统的数学模型、数据加密原理和与椭圆曲线加密密切相关的有限域理论; 2。

Because cryptology technology is the most important method to insure information against filched, next this thesis introduces development status of cryptology theory and some traditional cryptology.

首先本文介绍了计算机信息安全系统的脆弱性,针对计算机信息系统存在的不安全因素,论述计算机安全系统的管理措施和安全等级划分标准,并以此作为信息安全系统的设计准则。

第1/5页 1 2 3 4 5 > 尾页
推荐网络例句

With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.

随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。

But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.

不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。

Closes the eye, the deep breathing, all no longer are the dreams as if......

关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。