安全性
- 与 安全性 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Both of them were based on Elliptic Curve Cryptosystem and had high security.
两种算法均基于椭圆曲线密码体系,具有较高安全性。
-
This article first introduces the math foundation required by ECC,including the addition rule for elliptic curve point defined over finite field.Then , the principle of ECC is discussed and its security and efficiency of ECC are analyzed.Third, a cryptosystem is designed through analyzing the security requiration, choosing the elliptic curve domain parameters,denoting field element,elliptic curve and elliptic curve point,choosing associate primitves and schemes andpartitioning functional module.Forth, how to develop a crytosystem based on elliptic curve encryption algorithm is investigated.Fifth, a cryptosystem we have developed by us and the testing result is described.
本文首先介绍了ECC的数学基础,对有限域上椭圆曲线点的运算规则进行了详细描述;其次探讨了ECC的原理,分析了ECC的安全性和有效性;第三,设计了一个基于ECC的加密系统,包括系统的安全需求分析,域参数选择,域元、椭圆曲线、点的表示,原语和方案的选择,及整个系统的模块功能划分;第四,在设计的基础上,研究如何开发一个基于椭圆曲线的加密系统;第五,描述了一个我们已经设计与开发的基于椭圆曲线的加密系统,并给出了相应的测试结果。
-
Its security depends not only on the elliptic curve discrete logarithms but also on the choice of the elliptic curve and its system.
其安全性不仅依赖于椭圆曲线离散对数的分解难度,而且依赖于椭圆曲线的选取和椭圆曲线密码体制。
-
The zero-knowledge status authentication is a fascinating question of contemporary password research, and the elliptic curve is the cipher system having higher security in comparison with others.
零知识身份认证是当代密码研究的一个引人入胜的问题,而椭圆曲线相对于其它密码体制具有更高安全性。
-
In the embedment of the information, the hiding algorithm of Discrete Cosine Transform based on modular arithmetic has been chosen in the frequency law.
在秘密信息的嵌入入程中,选择了频域法中的基于模运算的离散余弦变换隐藏算法,这样就增强了隐秘载体在传输入程中的安全性。
-
Objective To evaluate the curative effect and safety of modified thoracic trocar and drainage tube which can be lavaged for empyema treatment.
目的观察应用改良胸腔套管针及可冲洗胸腔引流管治疗脓胸的疗效和安全性。
-
The technic that be used in the authentication process are dynamic password, attack threshold and synchronous encipher.
本体制设计的目的是为了同时抵御搭线窍听和穷尽攻击,具有较高的安全性和一定的实用性。
-
A secure transport protocol combine digital signature, encipher and message digest technology is used to assure the security of collaboration.
为了保证协作的安全性,在协作过程中采用了基于数字签名、加密、摘要的安全传输协议传送协作内容。
-
The level of our body is a fully enclosed metal vehicle, security is very good.
我们的车身水平是一个金属的全密封式车身,安全性是非常好的。
-
Data base data be lost and data base have been assumed analysis by encompassment of illegal consumer data base security technology.
本文以比较常用的access、数据库为例围绕数据库的安全性技术作了分析。
- 推荐网络例句
-
But we don't care about Battlegrounds.
但我们并不在乎沙场中的显露。
-
Ah! don't mention it, the butcher's shop is a horror.
啊!不用提了。提到肉,真是糟透了。
-
Tristan, I have nowhere to send this letter and no reason to believe you wish to receive it.
Tristan ,我不知道把这信寄到哪里,也不知道你是否想收到它。