加密
- 与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The main operations is point operation in elliptic curve. Compared with previous certificateless encryption schemes related to bilinear pairing operation the scheme is more efficient on computation.
该方案主要涉及椭圆曲线上的点运算,与原有无证书加密方案中采用双线性对计算相比具有更高的执行效率。
-
Besides, how to achieve fast point multiplication will influence the performance efficiency of the whole encryption system; in this article, for different situations, signed binary method and rolling window method are respectively applied to perform quick operation of elliptic curves point multiplication.
在密码层上实现了基于大素数域GFp=2~(192-2~(64)-1的密钥交换、ELGamal加密和椭圆曲线数字签名。
-
A new method of finding the points on an elliptic curve by Maple is supplied; Maple is applied to the addition operation, the scalar product operation and the method of seeking the order of a basic point on the elliptic curve are proposed; the applications of Maple on ECC including encryption and decryption are supplied.
利用Maple编程求出椭圆曲线上有理点,用Maple实现椭圆曲线上两点的加法、点的数乘运算及求某个基点阶数的算法,利用Maple实现椭圆曲线密码体制的加密及解密。相比C语言,Maple语言更接近于平时说话的语法。同时,Maple语言可以方便地转化成C语言。
-
The method this paper discussed was based following theoretic analysis: Square and multiplication of large integer are two basic operations in modular exponential m_ary algorithm. The main operations of m_ary algorithm of point multiplication in elliptic curve encryption were doublings and point addition. The steps of m_ary algorithm in point multiplication was similar to modular exponential.
其基于以下理论分析:模幂m_ary算法的基本运算为大数乘法,其中包括大数平方算法和一般大数乘法;椭圆曲线加密算法中点乘的m_ary算法步骤与模幂的m_ary算法相同,后者的基本运算为倍乘和加法。
-
At first, this paper studies the structure and security situation of electric enterprises information network, then introduces the basic theory of intrusion tolerance. After that, we study the key technology of intrusion tolerance: set up a distributed intrusion detection system model based on mobile agent; study the object replication technology and improve the voting algorithm; analyze and research the elliptic curve encryption system.
论文首先研究了电力企业信息网络结构以及安全现状,接着介绍了入侵容忍的基本理论,然后着重研究了入侵容忍的关键技术:建立了一种基于移动Agent的分布式入侵检测系统模型;研究了对象复制技术,改进了表决算法;分析和研究了椭圆曲线加密体制。
-
In SNA products, a key used to encipher operational keys that are to be used at a node
在系统网络体系结构产品中,对将要在某个网点上使用的操作键标进行加密的一种键。
-
In sna products , a key used to encipher operational keys that are to is used at a node
在系统网络体系结构产品中,对将要在某个网点上使用的操作键标进行加密的一种键。
-
I show two examples of the alphabet here so that everybody can try to encipher the presumable code message.
我展示两个字母在这里作为例子,让大家可以尝试对加密的代码信息进行推测。
-
After presenting the detailed encipher rule and decipher role, its characteristics is analyzed.
详细介绍了该方法加密和解密的具体实现规则。
-
And encipher his nature into mine.
其性质和加密到地雷。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。