英语人>网络例句>密码学 相关的搜索结果
网络例句

密码学

与 密码学 相关的网络例句 [注:此内容来源于网络,仅供参考]

In this paper, the linear equivalence of output coordinate functions of affine inverse function s and the S-box of Camellia are discussed.

有限域上的逆函数左右复合一个仿射置换而成的仿射逆函数具有很好的密码学性质。

Affine inverse function s derived from the inverse function composed with affine permutations possess good cryptographic properties.

有限域上的逆函数左右复合一个仿射置换而成的仿射逆函数具有很好的密码学性质。

Boolean function; algebraic degree; correlation immunity; resilient; nonlinearity; balancedness

论文导师戚文峰,论文学位硕士,论文专业密码学

Here contains detailed cryptography, as well as various algor...

这里包含了密码学的详细介绍,以及各种算法,相信对大家一定有用。

The ECC theory was studied in this paper. Polynomial was used to complete the hardware design of all kinds of algorithm including multiplication, division, point addition, point doubling和 point multiplication in GF (2m).

本文研究了椭圆曲线密码学理论,采用多项式基实现了椭圆曲线在有限域GF(2m)中各种运算的硬件设计,这些运算包括乘法、除法、点加、倍点和点乘,并用软硬件结合的方式实现了ECC的加/解密流程。

The finite field arithmetic is the base of cryptography and modular inversion is the kernel arithmetic operation.

有限域的运算是密码学的基础,而在有限域的所有运算中模逆运算是最核心也是最复杂的运算。

This article presents some background knowledge, including the symmetric and asymmetric encryption system in cryptography field, the developments of the elliptic curve cryptosystem and PKI.

本文介绍了密码学领域里的对称加密体制和非对称体制、椭圆曲线的发展现状和PKI架构。

Using the theories of probability, algebra and spectral theory comprehensively, we investigate some related characteristics of logic functions in cryptography: Firstly, we introduce m order generalized s - correlation immunity of Boolean vector functions and prove that the higher order generalized ε- correlation immunity can guarantee the lower order generalized ε- correlation immunity. Then by applying decomposition formula of joint distribution of Boolean random vectors, we give a spectrum criterion of m order generalized e - correlation immunity of Boolean vector functions. Furthermore, we show that the algebraic degree of m order generalized e - correlation immune Boolean vector functions is not restricted by the correlation immune orders.

本文主要运用概率论的思想和方法,并结合代数学和频谱理论的相关知识,对密码学中逻辑函数的有关性质进行了研究,主要包括以下三个方面的内容:首先,对布尔向量函数的相关免疫性进行了拓展,给出了k维布尔向量函数m阶广义ε-相关免疫的概念,证明了布尔向量函数的高阶广义ε-相关免疫性蕴含低阶广义ε-相关免疫性,并根据布尔随机向量联合分布分解式得到了布尔向量函数m阶广义ε-相关免疫的一个谱判别条件,还说明了m阶广义ε-相关免疫布尔向量函数的代数次数不受相关免疫阶数的制约。

Zero knowledge protocol is a basic method of cryptography,which means that the certifier owns a secret,and it doesn′t reveal any other useful information about the secret to verifier when authenticated.

零知识证明是密码学中的一个基本方法,是指证明者使验证者确信证明者拥有某一个秘密值,而证明者没有向验证者泄漏关于该秘密值的任何有用信息。零知识证明的基本思想。

Architecture design of a Chinese information security toolkit is described.The CIST has a security kernel.And multi-security policies are used in the kernel.

这里讲的安全,主要指信息的加密保护、用户身份认证和电子交易确认等更偏重于密码学的内容,它们是搭建网络经济信任体系的基石。

第6/16页 首页 < ... 2 3 4 5 6 7 8 9 10 ... > 尾页
推荐网络例句

As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.

每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。

Maybe they'll disappear into a pothole.

也许他们将在壶穴里消失

But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.

但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。