英语人>网络例句>加密 相关的搜索结果
网络例句

加密

与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]

Provable Security is a formal method for proving the security of cryptographic schemes, in which the difficulty of breaking a particular scheme is formally related to that of solving a widely believed computational hard problem. Provable security has already become an important theme of theoretical researches in modern cryptography. This dissertation investigates the provable security of public-key encryptions and hybrid encryptions of asymmetric and symmetric encryptions. This includes the various formal security notions and the constructions can be proved to achieve them. Among the constructions, hybrid encryptions are themselves an important way to obtain public-key encryption schemes with chosen ciphertext security. The main results are as follows:(1) The one-wayness of the trapdoor one-way function in NTRU depends on the randomness of the session key, which is different from previous ones. Based on this observation, a new kind of trapdoor one-way function, trapdoor one-way functions with an auxiliary random variable is proposed.

可证明安全性是一种证明密码学方案安全性的形式化方法,它将密码学方案的安全性归约为公认的计算难题,已成为现代密码学领域中理论工作的主线,本文主要研究公钥加密与单双钥混合加密的可证明安全性,这包括它们的各种形式化安全性定义以及达到这些安全性定义的方案构造,而单双钥混合加密本身也是一种构造选择密文安全公钥加密的重要方法,本文得到的主要结果如下:(1)在研究NTRU公钥加密的特殊性基础上,对于公钥加密的陷门单向函数加密模型进行了扩展,提出了具有辅助陷门单向函数的概念,并将其扩展到多元的情况,讨论了可能的密码学用途。

In this paper, we propose a new visual cryptographic method for gray-level and chromatic images without pixel expansion. We simultaneously encrypt m successive pixels (called an "encryption sequence") each time in accordance with two basis matrices. In every m encryption sequences with b blacks, we make sure that b encryption sequences are encoded by black basis matrix, and the other ones are encoded by white basis matrix.

本研究提出一种不需要像素扩展的灰阶和彩色视觉密码的技术;我们的方法利用多点同时加密的概念,每次取连续的 m 个点做为加密序列进行加密,我们的方法可以确保在 m 个具有 b 个黑点的加密序列中,一定会有 b 个加密序列是使用黑点基础矩阵加密,另外的个则使用白点基础矩阵加密,因此在叠合影像上黑与白的变化很规律。

In this paper we firstly discuss the general concepts of compter security and cryptology, and then describe the mostly used modern encryption methods and technologies. We detail the advantages and disadvantages of symmetric algorithm, public-key algorithm and one-way hash function. At last we put forward a new block cipher - permutation code, and describe the secret hash digital signature and online electronic contracting with the trusted third party system.

本文首先讨论计算机安全和密码学的一般概念,然后介绍现代加密手段常用的方法和技术,详细讨论了对称加密方法、公开密钥加密方法和单向散列加密方法的优点和不足,进而提出了一种新型的分组加密算法—排列码加密算法,并在此基础上实现了保密散列数字签名算法和有可信第三方参与的网上电子签约。

Chaper 3 is general description of ADA encryption. Chapter 4 deals with the transform domain encryption. Includes the element of perfect and quasi-perfect transform domain encryption, and presents two type new schemes. Chapter 5 deals with asynchronous ADA encryption. Extends the general theory and model of asynchronous ADA scrambling, and introduces two type phase-distortion-free a synchronous ADA schemes. Chapter 6 is about new direction of ADA encryption. Includes TASI scrambling, transform domain dummy insertion scrambling, noise coving scrambling and other multi-dimension ADA scrambling, and proposes an adaptive dummy spectrum insertion asynchronous scrambling and a new adaptive noise-coving DFT scrambling algorithm. Chapter 7 is on permutation key. presents part results on permutation features, selecting criterion and constructing method. Chapter 8 introduces the hard and software design of a common ADA encryption/decryption system, and presents the experimental results on several proposed ADA encryption schemes.

第一章为绪论;第二章为语声信号、及其处理基础;第三章为模数模加密的一般描述;第四章为变换域加密研究,包括变换域加密机理,变换域完善与准完善保密研究,提出两种新的变换域加密方案;第五章为异步模数模加密研究,扩充了异步模数模加密的一般理论,介绍了两种新的无相位失真异步加密方案的原理与实现方法;第六章对模数模加密新方向:TASI应用途径、变换域伪谱插空置乱、噪声掩盖、多维置乱加密的原理和方法进行介绍,提出了自适应伪频插空异步模数模置乱算法与自适应DFT系数噪声掩盖置乱新算法;第七章为置换密钥性质、筛选准则以及构造方法研究的部分结果;第八章介绍了通用模数模加/解密实验系统的硬件、软件研制概况,并给出了几种加密方法的实验结果。

This paper was put forward to the method, principle and procedure of third infilling in order to the economic effective development based on fine reservoir description and remaining oil research.

本文以大庆油田三次加密矿场实践为依据,通过对试验效果的系统评价研究,提出了对三次加密井工艺技术的要求;分析了低效井的原因,研究了降低低效井比例的有效方法,并在杏一~三区矿场试验中得到了验证;通过对加密井单井经济技术界限研究,搞清了三次加密调整的投资成本构成,制定了三次加密调整井增加可采储量、厚度和产量界限;指出了三次加密潜力对象及其分布特征;提出了以精细地质研究为基础搞清薄差储层沉积特征及空间展布、以剩余油综合描述为手段定量描述各沉积单元的剩余油分布特征、以经济有效开发为目的的三次加密调整方法、原则和程序;制定了三次加密井初含水与可采储量测算方法;研究确立了扩大三次加密调整规模的途径。

In the symmetrical encryption system aspect, discussed the des algorithm with emphasis, has given it in the key management, the safe application aspect exists question; the problem which in the asymmetrical encryption system aspect, studies in with emphasis which rsa and the application has the question, the ecc merit and should pay attention and so on.through the quite symmetrical key encryption system and the public key encryption system good and bad points,summarize should use the mix key encryption system in the electronic commerce, both guarantee data security, and may enhance encrypts and deciphers the speed.

在对称加密体制方面,重点讨论了des 算法,给出了其在密钥管理、安全应用方面存在的问题;在非对称加密体制方面,重点研究rsa及其应用中存在的问题、ecc的优点及应注意的问题等。通过比较对称密钥加密体制和公开密钥加密体制的优缺点,总结出在电子商务中应采用混合密钥加密体制,既保证数据安全,又可提高加密和解密速度。

All business logic components are based on DCOM. It provides the Business Process Reengineering function, and output/input interfaces based on XML in order to exchange data with different operating system and platform. The system adopts dual encryption with software and hardware: Encapsulating the function of CryptoAPI of Microsoft provides file enciphering interface and file deciphering interface.

本系统采用软加密和硬加密结合的方式来保护软件:封装微软加密库,形成加密、解密组件,提供加密接口和解密接口函数;采用Access库的安全机制,对数据库建立SqServer.mdb三级安全机制;将用户数量写入硬件加密狗中,控制客户端的数量。

The system adopts dual encryption with software and hardware: Encapsulating the function of CryptoAPI of Microsoft provides file enciphering interface and file deciphering interface.

本系统采用软加密和硬加密结合的方式来保护软件:封装微软加密库,形成加密、解密组件,提供加密接口和解密接口函数;采用Access库的安全机制,对数据库建立SqServer.mdb三级安全机制;将用户数量写入硬件加密狗中,控制客户端的数量。

This paper briefly introduced the development phases of software dog, expatiated on the software dog's software and hardware principles, and analyzed the sameness and difference between software dog and encrypted information. Based on the particular introduction of the inner architecture of CY7C68013 chip which belongs to Cypress corporations EZ-USB FX2 series, the paper gave the hardware implementation of software dog, presented the program flow chart of software dog, and introduced the making process of both driving program and super application program.

简单介绍了软件加密狗的几个发展阶段,具体说明了加密狗的软、硬件原理,并分析了软件加密狗与信息加密的异同,详细介绍了Cypress公司EZ-USB FX2系列CY7C68013芯片的内部结构,并给出了基于此芯片的加密狗的硬件实现,给出加密狗内软件程序流程图,并简要介绍了驱动程序和高级应用程序的制作。

First of all, the structure from the message, the message is divided into 3 parts: the first message, at the style, MAC address, so that packet transmission to reach the safety of the international financial sector standards; Secondly, the encryption method from the point of view, this The most prominent of the two systems were encrypted administrator password is encrypted on the card to encrypt passwords, especially for card encryption, the use of soft encryption service interface technology, using the work key, master key, the original password through the ciphertext key algorithm through two different DES encryption key to come up, we can imagine, I want to work at the same time key, master key, the text of the original secret password to a more difficult task, If the re-solution of the two DES, can be said to be completely impossible!

首先从报文结构上来看,报文分为3部分:报文头、报文体、MAC地址,使报文传输的安全性达到了国际金融行业的标准;其次,从加密方式来看,本次系统最突出的两个加密分别是对管理员密码进行加密、对卡密码进行加密,特别是对卡密码的加密,运用的是软加密服务接口技术,运用工作密钥,主密钥,原始密码通过算法得到密钥密文通过两次不同的DES加密才得出的密钥,可想而知,想要同时得到我的工作密钥,主密钥,原始密码密文本来就比较困难了,要是再解两次DES,可以说是完全不可能实现的!

第1/100页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。