查询词典 key up
- 与 key up 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Provable Security is a formal method for proving the security of cryptographic schemes, in which the difficulty of breaking a particular scheme is formally related to that of solving a widely believed computational hard problem. Provable security has already become an important theme of theoretical researches in modern cryptography. This dissertation investigates the provable security of public-key encryptions and hybrid encryptions of asymmetric and symmetric encryptions. This includes the various formal security notions and the constructions can be proved to achieve them. Among the constructions, hybrid encryptions are themselves an important way to obtain public-key encryption schemes with chosen ciphertext security. The main results are as follows:(1) The one-wayness of the trapdoor one-way function in NTRU depends on the randomness of the session key, which is different from previous ones. Based on this observation, a new kind of trapdoor one-way function, trapdoor one-way functions with an auxiliary random variable is proposed.
可证明安全性是一种证明密码学方案安全性的形式化方法,它将密码学方案的安全性归约为公认的计算难题,已成为现代密码学领域中理论工作的主线,本文主要研究公钥加密与单双钥混合加密的可证明安全性,这包括它们的各种形式化安全性定义以及达到这些安全性定义的方案构造,而单双钥混合加密本身也是一种构造选择密文安全公钥加密的重要方法,本文得到的主要结果如下:(1)在研究NTRU公钥加密的特殊性基础上,对于公钥加密的陷门单向函数加密模型进行了扩展,提出了具有辅助陷门单向函数的概念,并将其扩展到多元的情况,讨论了可能的密码学用途。
-
To take advantage of the text arrangement functionality in devices with a keyboard, the component provides the '''insertAscii''' method. When Canvas or GameCanvas is used, the keyPressed method provides the ascii code of the button pressed. For normal keypad phones this is the ascii of the number pressed, for qwerty devices it will be the value of the key pressed. The device changes automatically the character set if the shift or numbers key is pressed and so the ascii received is different and corresponds to the intended key. The backspace character is also received as an ascii code, so it is not necessary to call in explicit way the delete function.
要充分利用键盘在设备里的文字安排功能,这个部份提供'''insertAscii'''方法,当Canvas或GameCanvas使用时,keyPressed方法提供按钮按下的ascii码,对於正常键盘手机来说这是按下数字的ascii,对qwerty设备来说它会是按下键的值,假如shift或数值键被按下该设备会自动改变字元集,所以所收到的ascii是不同的并且对应於所要的键,倒退键字元也会以ascii码来收取,所以没有必要用明确的方式来呼叫删除的函式。
-
Afterward, the main control desk encrypts the session key by using a public key, and transfers encrypted configuration information and session key to configuration server of network phone.
然后,主控台以一公开密钥对会话密钥进行加密,并传送已加密过的配置信息与会话密钥至网络电话配置服务器。
-
In terms of the difference between encryption key and decryption key,it can divide into symmetry cryptogram and public key cryptogram.
根据加密密钥和解密密钥在性质上的差异,可以将密码体制分为对称密码和公钥密码两大类。
-
Such as tiffany rings, earring, necklace, neck chain, bracelet, bangle, cuff link, money clip, key ring, key chain, key buckle .
如凡尼戒指,耳环,项链,头颈链,手链,手镯,袖口环线,钱夹,钥匙圈,钥匙链,钥匙扣。
-
Key figure in the finish with the key switch between nine key directions, Power icon in a square adjacent to the keyboard icon to direct current state:the current figure is crucial if Green is the color icon, the icon is a crucial nine direction is a yellowish color.
关键人物完成的关键九年之间切换的主要方向,电源图标方形邻近键盘图标直接现状:目前的数字是至关重要的,如果是绿色的彩色图标,图标是一个重要方向是9黄颜色。
-
After discussion of the relation of MR〓 and ALT, an algorithm proposed by Zhongping Qin and Huanguo Zhang, two conclusions are obtained: if a weak key can be successfully attacked by the method of reduced echelon matrix, it can also be successfully attacked by a linear R〓R〓 transformation; meanwhile, there exists such a weak key that can be successfully attacked by the algorithm MR〓 or linear R〓R〓 transformation, but this key can not be successfully attacked by the algorithm ALT. For a NFA, according to the number of solutions for the image equation of its R〓R〓 transformation, there exist two sufficient criteria about its weak invertibility and weak inverse.
通过比较MR〓与覃中平和张焕国提出的攻击FAPKC加密情形的算法ALT,证明了如下结果:凡用约化梯阵方法能攻击成功,用线性R〓R〓变换也能攻击成功;同时,存在着用算法MR〓或线性R〓R〓变换攻击成功的弱密钥,用算法ALT攻击失败。
-
If you no longer want the table to have a primary key, select the field designated as the primary key in the top portion of the window, and on the Edit menu, click Primary Key.
如果您不再希望表具有主键,请在窗口的上半部分中选择指定为主键的字段,然后在"编辑"菜单上,单击"主键"。
-
If you no longer want the table to have a primary key, select the field designate d as the primary key in the top portion of the window, and on the Edit menu, click Primary Key.
如果您不再希望表具有主键,请在窗口的上半部分中选择指定为主键的字段,然后在"编辑"菜单上,单击"主键"。
-
Is welcomed buying the house , the first key elements is section of an area , second key elements are section of an area , third key element are still section of an area.
值得注意的是,表2和表3中职业所处的位置是动态而非静态的。如煤炭业,今年的表现就不俗,各项指标上涨幅度喜人。
- 相关中文对照歌词
- Down On Longboat Key
- Key Lime Pie
- The Key
- Ring Ding Dong
- Love Is The Key
- J'Adore
- Key West
- Paranoia Key Of E
- Key Of Life
- Key To The Kingdom
- 推荐网络例句
-
The witness also told the jury at the Royal Courts of Justice in London that he saw a paparazzo fighting with a member of the public who was trying to stop him taking pictures in the minutes before the emergency services arrived.
他还告诉在伦敦皇家法庭的陪审团,在急救服务到来之前,他当时看见一个狗仔队正和一群阻止他拍照的人打架。
-
The entire N/C program on a tape is made up of an accumulation of these successive data blocks.
纸带上的整个数控程序由这些连续数据单元连接而成。
-
My master$s troops have been dispatched to your aid.
我的主人的部队正在前往你那里的路上。