cryptograph造句
例句與造句
- Archaeological studies of chinese music and military cryptograph
中國樂曲考古學(xué)與軍事密碼學(xué)的比較 - Its key idea of this project is to balance the transmitting efficiency and the transmitting cryptograph
針對這些存在的問題,筆者提出了一種改進(jìn)方案? ? bb84 +量子密鑰分配方案。 - The difficulty of decoding based on cryptograph and public key is equal to the difficult } " of dividing the product of two big prime numbers
從一個公開密鑰和密文中恢復(fù)出明文的難度等價于分解兩個大素數(shù)之積。 - Cryptology is the core of the information security . modern cryptograph divides into the public key system and the private key system
密碼學(xué)是信息安全技術(shù)的核心,現(xiàn)代密碼體制分為公鑰體制和私鑰體制兩大類。 - In this paper , the security of the wtls is analysed . now elliptic curve and ripemd160 cryptograph algorithm is two latest methods and do not easily attack
橢圓曲線法和ripemd ? 160是兩種目前較新的加密算法,且不易被破解,本文初步分析和研究了這兩種方法。 - It's difficult to find cryptograph in a sentence. 用cryptograph造句挺難的
- Last we describe the functions of the system in brief in the sixth chapter , we introduce the cryptograph protocol and the sollltion of some typical cryptosystems
第六章介紹了密碼協(xié)議與典型密碼系統(tǒng)的實(shí)現(xiàn)方案。說明了密碼協(xié)議及其在安全系統(tǒng)中的應(yīng)用,并分析了目前廣泛應(yīng)用的典型密碼系統(tǒng)實(shí)現(xiàn)方案。 - This thesis mainly analyses security in the wtls and reasons for defects , study two solutions of security in the wtls which are elliptic curve and ripemd160 cryptograph algorithm
本文主要分析了wtls的安全漏洞及其存在的原因,并在此基礎(chǔ)上研究了兩種解決wtls安全問題的方法? ?橢圓曲線和ripemd ? 160算法。 - The paper introduces a sort of encrypted algorithm which comparied with the original length of cryptograph , the length of encrypted cryptograph will base on the difference of the encrypted information piece length to minish
本文介紹了一種加密后的密文長度與原明文長度文相比,依據(jù)所選加密信息塊長度的不同而做相應(yīng)減小的加密算法。 - Public key cryptography , combined with the traditional symmetric cryptograph and the message digest technology , can provide confidentiality , integrity and proof of origin . it ' s the foundation of many secure applications
公鑰密碼技術(shù)結(jié)合傳統(tǒng)的對稱密碼技術(shù)及信息摘要技術(shù),可提供信息的保密性、完整性和信源確認(rèn),是多種安全應(yīng)用的基礎(chǔ)。 - The main reseach works we do as follows : ( 1 ) cryptograph is the effective and the only technicle to ensure data confidentiality . in this paper we expended the basic concept and class of encrpytion techniques .
本文做的主要研究工作如下: ( 1 )加密技術(shù)是實(shí)現(xiàn)數(shù)據(jù)機(jī)密性有效甚至是唯一的解決方案,本文首先對加密技術(shù)進(jìn)行了探討,介紹了相應(yīng)的加密機(jī)制并進(jìn)行了分析。 - The method of chaotic masking was also used to randomize the cryptograph . the computer experiments show that the chaotic encrypting system was fine in security and can resist the decipher analysis ; what ' s more , the system is easy to realize
通過仿真分析各項性能(保密性能、對參數(shù)的靈敏度等) ,結(jié)果表明該系統(tǒng)具有較強(qiáng)的自同步能力和較高的保密性能,并且易于實(shí)現(xiàn)。 - Concerning about the actual application , this project is a compromising method to enhance the transmitting efficiency with the sacrifice of decreasing the degree of cryptograph under the condition that the security is assured in actual application
這種方案的核心思想是在傳輸效率和傳輸保密性上取得更加實(shí)用性的平衡??紤]到實(shí)際應(yīng)用情況,此方案在保證安全性的前提下,降低保密性能以提高傳輸效率。 - In addition , the existence of quantum non - cloning theorem leads to the birth of quantum cryptograph . in principal , quantum cryptograph can provide perfect secure and unattacked secret communication system , which is guaranteed by the law of quantum mechanics
又如,在量子信息學(xué)中因?yàn)榇嬖诹孔硬豢煽寺《ɡ?,從而誕生了量子密碼學(xué),它原則上能夠提供不可破譯、不可竊聽的保密通信體系,其安全性由量子力學(xué)基本原理所保證。 - In the second chapter , some conunon used cryptograph algorithins are introduced , including the algorithms used in synunetric cryptosystem and asyrnmetric cryptosystem . we describe the theory of each algorithins and compare the elliptic curve cryptosystem with the other two asyinmetrc cryptosystems to show the advantages of this algorithin
包括常用的私鑰密碼算法和公鑰密碼算法,說明各種算法的原理和優(yōu)缺點(diǎn),重點(diǎn)將橢圓曲線算法與其他幾種公鑰密碼算法比較,說明橢圓曲線算法的優(yōu)勢。
更多例句: 下一頁