明文
- 与 明文 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The following is a notation for relating plaintext,ciphertext,and keys,We will
下面是有关明文,密文和密钥关系的表示法。我们用 C=E k表示用密钥 K
-
For any given ciphertext, the corresponding plaintext can be found in less than 2^19 operations over a finite field of size 2^8 by linearization equation attack.
对于给定的合法密文,可以利用一阶线性化方程攻击方法在2^19个2^8域上的运算内找到了其相应的明文。
-
As a result, the terms of reference should accurately grasp the attention of the households and public places, the exact connotation and extension so as to avoid violation of the law without crimen sine lege principle.
因此,引用此条款时,应注意准确把握户与公共场所的准确内涵和外延,以免违反法无明文不为罪的原则。
-
He enunciated three basic maxims :nulla poena sine lega ,nulla poena sine crimine nullan crimen sine poena legali , His integration of the prevailing political liberalism with penal policy was simple enough :only one who violates the liberty guaranteed by the social contract and safeguarded by penal law commits a crime .
他阐明了三条基本格言;"法无明文者不罚""无法以为罪者不罚"和'无法定刑罚者不为罪他把当时盛行的政治自由主义同刑事政策结合起来的思想是相当简括的。只有那些侵犯了由社会契约所保障,由刑法所保护的自由的人们,才犯了罪。
-
We show that unless a cryptanalyst can completely break the RSA encryption ,any heuristic oracle he uses to determine the least significant bit of the cleartext must have an error probability greater than 1/2-ε.
证明了,对于任意用于确定RSA明文的最后一个有效位的启示,必须有大于1/2-ε的出错概率,否则密码分析人员能够完全破译RSA。
-
The cryptography technology based on the private or public key can be used to control the data access and change the straightforward information into the baffling cryptograph information.
基于私有或公共密钥的加密技术可以用来控制数据访问,它将明文消息变换成旁人无法理解的密文消息。
-
Encipherer uses the public key encryption which should be transmitted. The decipherer only cares about private key which transmits through the secure channel by TA, needn't to care about instead of how to produce.
加密者用TA公布的公钥对要传送的明文加密,解密者只关心TA通过安全信道传来的私钥,不用再关心它们是如何产生的。
-
" Byelaw " proclaimed in writing prohibits detinue, use, natural resources of system of filch computer information, system of information of filch, diddle, capturing computer controls right, do sth without authorization publishs other email address and material of other individual information to tripartite, date of filch other Zhang and password, or do sth without authorization publishs other Zhang date and code to tripartite, sham other name sends message, make intentionally, the ruinous program such as software of transmission ill will.
条例》明文禁止非法占有、使用、窃取计算机信息系统资源,窃取、骗取、夺取计算机信息系统控制权,擅自向第三方公开他人电子邮箱地址和其他个人信息资料,窃取他人账号和密码,或者擅自向第三方公开他人账号和密码,假冒他人名义发送信息,故意制作、传播恶意软件等破坏性程序。
-
Byelaw is right a series of malfeasant undertake proclaimed in writing prohibits, include detinue, use, natural resources of system of filch computer information, system of information of filch, diddle, capturing computer controls right, do sth without authorization publishs other email address and material of other individual information to tripartite, date of filch other Zhang and password, or do sth without authorization publishs other Zhang date and code to tripartite, sham other name sends message, make intentionally, the ruinous program such as software of transmission ill will.
条例对一系列不法行为进行明文禁止,包括非法占有、使用、窃取计算机信息系统资源,窃取、骗取、夺取计算机信息系统控制权,擅自向第三方公开他人电子邮箱地址和其他个人信息资料,窃取他人账号和密码,或者擅自向第三方公开他人账号和密码,假冒他人名义发送信息,故意制作、传播恶意软件等破坏性程序等。
-
The main content of this thesis includes six parts. First of all, it is a comprehensive systematic introduction about RSA algorithm including the present application situation and principle of RSA algorithm----producing big prime numbers and secret keys, the encryption arithmetic for information and the decryption for secret information, which establish the theory foundation for achieving concrete; secondly, it introduces some basic conception of RSA digital signature and theory of digital signature realizing process; thirdly, it introduces the basic principle of MD5 algorithm; fourthly, it states design and realization of RSA digital signature in detail. The main modules includes producing RSA secret keys, implementation of RSA encryption algorithm and decryption algorithm, producing message digest and realizing digital signature and verification by RSA; the fifth, it carries on testing entirely, analyzing and improving for this system;The sixth, it analyses the security of RSA digital signature and points out the development direction of RSA digital signature.
本文主要研究的内容包括:第一,对RSA算法进行了全面系统的介绍,包括RSA算法的应用现状和原理—大素数的产生、密钥对的产生、对明文的加密运算和密文的解密运算,为具体实现打下了理论基础;第二,介绍了RSA数字签名的一些基本概念和数字签名的理论实现过程;第三,对MD5算法基本原理的介绍;第四,详述了RSA数字签名的设计与实现,主要实现的模块包括RSA密钥的产生,RSA加密算法和解密算法的实现,消息摘要MD的生成以及利用RSA算法实现数字签名和签名的验证;第五,对该系统进行了整体的测试和分析改进;第六,分析了RSA数字签名的安全性,指出了RSA数字签名的发展方向。
- 推荐网络例句
-
As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.
每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。
-
Maybe they'll disappear into a pothole.
也许他们将在壶穴里消失
-
But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.
但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。