密码学
- 与 密码学 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
I hope this small pulpit might help in that endeavor to recognize Merkle's equal contribution to the invention of public key cryptography.
我希望这个小小的讲坛可以帮助我们认识到Merkle对公钥密码学的同等重要的贡献
-
Because the implanted hash function of HMAC is implemented as an individual function block, this block could be replaced easily according to the security request. The high capability of withstanding attacks of HMAC-ECDSA algorithm is proved by using modular arithmetic.
从密码学理论分析,HMAC可以使用密钥且HMAC算法的验证只在当时有效;在程序设计中实现HMAC时,可以将嵌入的哈希算法作为一个独立的模块,根据安全强度的需求替换哈希算法模块;在对攻击高抵抗性的证明中,利用模运算对HMAC-ECDSA算法的安全强度进行了验证。
-
Secure multiparty computation with its applications is an important direction in current cryptography research field.
安全多方计算及其应用是目前密码学领域的一个重要研究方向。
-
Finite Multiplicative Group In cryptography, we often use the multiplicative finite group: G = in which the operation is multiplication.
有限乘法群在密码学中,我们经常运用乘法有限群:G =,其中的运算是乘法。
-
Security based on cryptography and authentication alone is not sufficient, because cryptography cannot prevent malicious or non-malicious attacks from internal adversaries or faulty nodes.
无线传感器网络有其资源受限的特点,单靠密码学和认证无法阻止网络内部的恶意或非恶意攻击以及节点的异常行为。
-
Finally this thesis analyses the efficient revocable group signature scheme with forward security proposed by Chen Shaozhen and Li Daxirig. An adversary can personate a legal group member by forge a group membership certificate, and then can forge group signatures that can be verified by a verifier. And the group manager can also forge group signatures that can be verified by a verifier. So the scheme is insecure. Meanwhile, there are redundancy steps in the scheme, thus the efficiency is low.
接着,对陈少真和李大兴提出的一种有效取消的前向安全群签名方案进行了密码学分析,一方面,攻击者可以通过伪造群成员证书来伪造能够通过验证的群签名;同时,群管理员也可以伪造一个可以通过验证的群签名,因此,该群签名体制是不安全的;另一方面,该体制存在冗余数据。
-
Based on the difficulty of computing discrete logarithm over finite field of large prime order and the method of Lagrange interpolation, an unconditional secure general verifiable secret sharing protocol applicable to arbitrary access structures is presented.
在计算复杂性方面与目前已有的高效门限 VSS方案相差不大。由于其安全性、效率及代数结构方面的特点,这样的协议将会在分布式的密钥管理、分布式的容错计算、面向群体的密码学及电子商务中得到广泛的应用。
-
In this thesis, we investigate and show how to achieve both practical and general zero-knowledge systems that can be securely run in concurrent and resettable settings with both concurrent prover security and concurrent verifier security in general public-key models.
因为零知识证明系统在当代密码学中处于中心的位置,并且由于Internet以及Internet上基于智能卡的电子商务的广泛普及和大规模应用,我们的工作具有极其重要的理论和实际意义。
-
In this dissertation, we mainly use character matrix to research cryptology characteristic of Boolean function and m-ary logic function.Firstly, by using properties of character matrix's row and column we get an equivalence condition of bent function. Then we have an entirely construct method of 4 variable bent function.
本文利用特征矩阵研究了密码学中逻辑函数的相关问题,主要做的工作有:首先,根据Bent函数的自相关特征,利用特征矩阵给出了Bent函数的一个新的等价判别条件,并由此得到了4元Bent函数的一个完全构造方法。
-
Block cipher, substitution box.
论文导师肖国镇,论文学位博士,论文专业密码学
- 推荐网络例句
-
As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.
每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。
-
Maybe they'll disappear into a pothole.
也许他们将在壶穴里消失
-
But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.
但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。