查询词典 elliptic system
- 与 elliptic system 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
ECC system makes use of the finite group of elliptic curve on the finite field instead of finite cyclic group used in the discrete logarithm problem. The theory of ECC is being studied a lot and it is the focus of the cryptography and the industrial estate, especially the technique of the implementation of ECC.In this thesis, the meaning of the information technology is discussed firstly, then we analyze the classical cryptography algoritham. After that, the mathematics base of elliptic curve cryptosytems are introduced, especially the theory of the finite field. As for some algorithms, we also give out the program of reliazation.
随后,介绍了研究椭圆曲线密码系统所需要的数学理论基础,特别是有限域中的椭圆曲线理论,并对相关的方法给出相应的实例及其程序实现;论文第三章讨论给出了椭圆曲线密码体制的研究现状,综述了椭圆曲线与现有一些密码算法的结合,介绍了椭圆曲线的离散对数问题以及椭圆曲线面临的攻击,详细描述了椭圆曲线密码系统的实现细节及各个部分的实验数据。
-
The main task of this article contains:compares algorithm and encryption and decryption between the widely-used public key encryption system RSA and ECC;(2) directing against present elliptic curve attack algorithm, uses SEA algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve"s ELGamal encryption and decryption and digital signature;(3) discusses elliptic curve"s application on smart card and proposes two identification plans based on EEC.
2针对目前已有的椭圆曲线攻击算法,使用SEA算法实现了安全椭圆曲线的选取,实现了基于大素数域上的椭圆曲线的ELGamal加解密和数字签名。(3)讨论了椭圆曲线在智能卡上的应用,并提出了两种基于ECC的身份认证方案。
-
In a kind of quasi dissipative systems the disappearance of some elliptic periodic orbits and the elliptic islands around them via a collision with the discontinuous border of the system function can be observed.
在一种类耗散系统中观察到了椭圆周期轨道及其周围的椭圆岛与映象不连续边界碰撞而消失的现象。
-
We organize it along the following lines: In Chapter 1 we discuss the fixed boundary problem with elliptic equation or elliptic equations system.
具体内容由以下三章组成:第一章我们讨论的是具有固定边界的椭圆型方程问题和椭圆型方程组问题。
-
First in Section 1 we obtain the estimate of holder norm in time direction about the system of elliptic equation and elliptic equations by difference method and the result will be used in Chapt...
首先,在第一节中我们对椭圆型方程问题和椭圆型方程组问题运用差分方法得到时间方向上的h?
-
The solution of the equation and the period of the particle motion for a non-pertubated system are expressed exactly by means of Jacobian elliptic function and the 1-st kind elliptic integral.Melnikov function of the rotated periodic orbit is constructed,and also bifurcation of the system is analyzed by the method.
利用Jacobian椭圆函数和椭圆积分给出了系统的解和粒子运动周期,用Melnikov方法构造了旋转型周期轨道的Melnikov函数,并用这个方法分析了系统的局部分叉性质。
-
Its security depends not only on the elliptic curve discrete logarithms but also on the choice of the elliptic curve and its system.
其安全性不仅依赖于椭圆曲线离散对数的分解难度,而且依赖于椭圆曲线的选取和椭圆曲线密码体制。
-
The book is divided into eight chapters, mainly introduced the super-elliptic curve cryptography algorithms of number theory based on hyperelliptic curve cryptography system, in addition to the core algorithm for computing sub-groups, from the ECC's technical standards to the super-elliptic curve cryptosystem implementation technology, but also on the super-elliptic curve cryptography and ECC and RSA in the security strength, complexity and the realization on the comparison.
全书共分八章,主要介绍了超椭圆曲线密码体制的算法数论基础、超椭圆曲线的密码学体系、除子群运算的核心算法、从ECC的技术标准到超椭圆曲线密码体制的实现技术,同时也对超椭圆曲线密码体制与ECC及RSA在安全强度、复杂度以及实现上进行了比较。
-
To seek new infinite sequence exact solutions to nonlinear evolution equationsNEE(s, the formula of nonlinear superposition of the solutions of the second kind of elliptic equation are given, infinite sequence exact solutions to combined KdV with varible coefficients and forcible term is constructed with the aid of symbolic computation system Mathematica, which include Jacobi-like elliptic function solutions, infinite sequence soliton-like solutions and infinite sequence triangular function solutions.
为了获得变系数非线性发展方程的无穷序列精确解,给出第二种椭圆方程解的非线性叠加公式,借助符号计算系统Mathematica构造了带强迫项变系数组合KdV方程的无穷序列精确解。这里包括无穷序列类Jacobi椭圆函数解、无穷序列类孤子解和无穷序列三角函数解。
-
This paper first analyses and summarizes the ststus quo and evolution trend of encryption, some common used cryptograph are introduced, including the algorithms used in symmetric cryptosystem and asymmetirc cryptosystem. We describe the theory of each algorithms and compare the elliptic curve cryptosystem with the other two asymmetric cryptosystems to show the advantages of this algorithm. Second, the principle of ECC is discussed, including the math foundation of ECC, basic conception of elliptic curves, constructiong idea of ECC, operation on the elliptic curve and so on. Third, the current attacks of ECC were analyzed deeply, and an algorithm based on limited prime number field was constructed. We analyzed its realizability in theory, and implement it by using certain function of MIRACL software package. Latter half in this paper, the implementation model of a simple elliptic curve encryption system which based on GF has been introduced. The paper also put a deep analysis on the algorithm of point addition and point multiplication.
本文首先对密码技术的发展现状及其发展趋势进行了分析和综述,详细的介绍了私钥密码系统和公钥密码系统的发展,说明各种算法的原理和优缺点,并给出了一些典型的密码体制的简要分析,重点将椭圆曲线算法与其它几种公钥密码算法比较,说明椭圆曲线算法的优势;其次,探讨了椭圆曲线密码体制的原理,包括椭圆曲线密码的数学基础、基本概念、椭圆曲线密码体制的构造思想等问题;第三作者对椭圆曲线的攻击现状作了详细的分析,针对所使用的大素数域F_p,设计了素数域上安全椭圆曲线产生的算法,从理论上做了可实施性分析,从软件上做了具体实现;在本文的后半部分,提出了一个简单的基于有限素数域上的椭圆曲线加密方按算实现模型,并对SECES中设计的点加和点乘运算进行了深入分析。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。