英语人>网络例句>密码学 相关的搜索结果
网络例句

密码学

与 密码学 相关的网络例句 [注:此内容来源于网络,仅供参考]

This paper briefly introduce basic knowledge of cryptology and method of cryptography and cryptanalysis in classical cryptology by using the number theory in mathematics.

本文通过使用数学中的数论知识,浅要介绍了密码学的基本知识以及传统密码学中的加密,解密方法。

The first chapter of this paper explains the development of cryptography, tradition cryptogram, Public Key Cryptosystem and the future of cryptography.

第一章就密码学的发展,古典密码及公开密钥技术进行说明,并对未来密码系统的发展进行了展望。

This thesis presents two approaches for designing chaotic cryptosystem. The cryptosystem combines cryptograph with chaotic synchronization.

本论文提出两种设计混沌密码器的方法,混沌密码器是结合混沌同步的特性及密码学的技术而成。

This book will focus on the core of Cryptography of issues, from the application point of view of discrete mathematics of cryptography on a system.

本书将重点集中放在密码学研究的核心问题上,从应用离散数学的角度对密码学进行了系统阐述。

Studies in Secure Computation and Application The problem of secure multiparty computation is fundamental in cryptography, as well as rel...

安全计算问题是密码学协议研究的基础问题之一,也与很多重要的密码学应用相关。

This thesis includes eight chapters: chapter 1 introduces the development background and target; chapter 2 expatiates the primary algorithms of cryptography; chapter 3 explains feasibility research report; chapter 4 shows the requirement analysis report; chapter 5 summarizes the preliminary design report; chapter 6 includes detailed design report and partial source codes; chapter 7 discusses the software testing report; chapter 8 acquires a whole-length summarization.

本文共分为8章:第1章介绍密码学综合实验系统的开发背景与目标;第2章阐述了密码学的主要加解密算法及原理;第3章为该系统的可行性研究报告;第4章是需求分析报告;第5章叙述了系统的概要设计;第6章介绍了系统的详细设计及部分编码;第7章为该系统的软件测试报告;第8章是对全文的总结。

In the study of cryptographic protection to data, a comprehensive cryptographically data protection architecture is present and implemented after analyzing the characteristics in enterprise application.

在对数据的密码学保护方面,根据动态联盟的不同企业间进行协同工作过程中对安全保障体系的各种要求,建立了一个综合的数据密码学保护体系。

What's more, it is open and secure cryptographically due to the fact that the synthetic information on a printed certificate is associated logically with encrypted verification information, which essentially changes the mode of the existing anti-counterfeit techniques for printed information.

系统的核心思想是通过完整的逻辑体系保证其密码学意义上的安全性,具有密码学意义上的高安全性,突破了现有打印信息防伪认证技术的模式。

UCSA maps each symbolic cryptographic operation in Dolev-Yao model to an ideal functionality in the UC framework, resulting in simpler proofs for cryptographically soundness at the same time.

UCSA框架将Dolev-Yao模型中密码学抽象操作与UC框架中的理想功能进行了结合,使得通过形式化分析方法可以证明安全协议的在密码学环境下的一些性质。

In this paper, the author first introduces some basic conception of Cipher technology and Shannon model of secret communication, then the paper discusses and analyses the advantages and problems of symmetric algorithm and dissymmetrical encryption.

在介绍密码学基本概念以及Shannon保密通信模型的基础上,分析了对称密码算法和公钥密码算法的优点及其在应用中注意的问题,最后对密码算法的发展及其应用的未来做出展望。

第2/16页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.

每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。

Maybe they'll disappear into a pothole.

也许他们将在壶穴里消失

But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.

但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。