加密
- 与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Eve is the name that cryptographers give to an eavesdropper.
而在量子加密法中,"伊芙"可以截取传输信息么?
-
It is a beneficial work for applying ECC to encode information.
为椭圆曲线密码体制用于信息加密做了有益的工作。
-
After discussion of the relation of MR〓 and ALT, an algorithm proposed by Zhongping Qin and Huanguo Zhang, two conclusions are obtained: if a weak key can be successfully attacked by the method of reduced echelon matrix, it can also be successfully attacked by a linear R〓R〓 transformation; meanwhile, there exists such a weak key that can be successfully attacked by the algorithm MR〓 or linear R〓R〓 transformation, but this key can not be successfully attacked by the algorithm ALT. For a NFA, according to the number of solutions for the image equation of its R〓R〓 transformation, there exist two sufficient criteria about its weak invertibility and weak inverse.
通过比较MR〓与覃中平和张焕国提出的攻击FAPKC加密情形的算法ALT,证明了如下结果:凡用约化梯阵方法能攻击成功,用线性R〓R〓变换也能攻击成功;同时,存在着用算法MR〓或线性R〓R〓变换攻击成功的弱密钥,用算法ALT攻击失败。
-
In order to make available for alternative Aiming bidding curves,improve the speed,precision and convergence, an effective method for generation scheduling is proposed based on an improved dynamic programming- local redefined dynamic programming .
为有效解决各种类型报价曲线的负荷经济分配,并考虑到计算速度、精度及收敛性等问题,采用了一种改进的动态规划法——局部加密动态规划法,并采取了限制机组组合状态的措施。
-
This article deals with the design and implementation of a cryptosystem based on elliptic curve .
本文主要完成了一个基于椭圆曲线的加密系统的设计和实现。
-
This paper presents the encryption algorithm based on elliptic curve of the basic working principles.
本文首先给出基于椭圆曲线加密算法的基本工作原理。
-
Microsoft has both good news and bad news when it comes to using Elliptic Curve encryption algorithms.
微软已经有好消息和坏消息当谈到利用椭圆曲线加密算法。
-
In this paper, encryption and decryption of elliptic curve cryptosystem over large prime fields and its application in digital signature introduced.
本文介绍了基于大素数域上的椭圆曲线密码的加密与解密及在数字签名中的应用。
-
It is analyzed that the identity-based cryptography and the elliptic curve encryption arithmetic,and also its application in E-business.
本文详细讨论了基于身份的密码体制和椭圆曲线加密算法,分析了其在电子商务的安全交易过程中的应用。
-
A new digital signature encryption scheme with message recovery based on elliptic curve cryptography is presented.
给出一种新的基于椭圆曲线密码的具有消息恢复功能的数字签名加密方案。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。