助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   public encryption 的翻译结果: 查询用时:0.061秒
图标索引 在分类学科中查询
所有学科
更多类别查询

图标索引 历史查询
 

public encryption
相关语句
  公开加密
     The L_m Certification Matrix of Public Encryption
     L_m公开加密认证矩阵
短句来源
     A nwe P3-4 data encryption standard with only ten-bit decimal digit in compute word size of PDX system constructure solves the compatibility problems to network computes and hardware. It possesses NBS' public encryption algorithm standard and has a high safety and practicality.
     根据PDX体制构造一种计算机字长只有10位10进数的P3—4新型数据加密标准,解决与网络微机及硬件兼容问题,该加密标准具有NBS的公开加密算法要求指标及高强度安全性和重要的实用性。
短句来源
     In this paper, Lm certification matrix structure of public encryption is demonstrated based on the coexistent no fixed solution equation of Pn public key.
     本文论证了基于P_n公钥共存无定解方程的L_m公开加密认证矩阵构造。
短句来源
     Liu's high intensity public encryption algorithm controls the structure, mode and operation (result of) random cutting apart, random form,function and non-linear encryption decipher by utilizing (variable )long key, and thus realizesd the extremely high intensity of encryption.
     刘氏高强度公开加密算法利用可变长密钥控制随机分割、随机格式、随机函数和非线性加密解密变换的结构、模式和运算结果,从而实现了极高的加密强度.
短句来源
  “public encryption”译为未确定词的双语例句
     CAD of chaos random high intensity public encryption algorithm
     混沌随机高强度公钥数据加密体制CAD
短句来源
     In the public key cryptosystem (PKC) , the attacker can get the public encryption key, so he can freely encrypt some plain-text chosen adaptively, i.e., he could choose plain-text attack.
     在公钥密码系统(PKC,public key cryptosystem)中,攻击者拥有加密公钥,他可以自由地用该公钥进行选择明文加密,即进行选择明文进行攻击。
短句来源
     Public Key Infrastructure has Provided four technological supports for the development of Internet based on the technology of the public encryption and digital signature, which are secrecy、 authenticity、 integrality and undeniablefeature.
     公钥基础设施利用公钥加密技术和数字签名技术给Internet应用的急剧发展提供了机密性、真实性、完整性和不可否认性等四大技术支持,加强系统之间、部门之间、国家之间不同的PKI信任域的互操作,已经成为目前PKI建设亟待解决的重要问题。
短句来源
     Compared with other provable secure encrypted key exchange protocols, because this protocol doesn’t need CCA2 (chosen ciphertext attack-2) secure public encryption scheme, it can reduce the number of exponible computations and greatly simplify the protocol’s description.
     与其他标准模型下可证安全的协议相比,改进后的协议不需要CCA2(chosen ciphertext attack-2)安全的加密方案,从而不仅可以减少指数计算的次数,而且具有协议规则简单的优点.
短句来源
     A novel public encryption algorithm with high intensity CRH(chaos random high) is proposed.
     提出一种新的混沌随机高强度公钥加密体制—— CRH公钥数据加密体制。
短句来源
更多       
  相似匹配句对
     THE PUBLIC-KEY CRYPTOSYSTEMS WITH COMPOUND ENCRYPTION
     复合加密的公开钥密码系统
短句来源
     The Public-key Cryptography of Data Encryption
     数据加密中的公开密钥算法
短句来源
     Public Funds:
     开放式基金让专家替我们赚钱
短句来源
     On the "Public Benefit"
     “公共利益”问题话要
短句来源
     The encryption and weaknesses of the E. ?
     分析了E.
短句来源
查询“public encryption”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  public encryption
With Conk, the arbitrator checks whether uR is R's public encryption key.
      
Veri cation just applies the public encryption function to the signature and veri es that the result is indeed the hash value of the document.
      
Verification just applies the public encryption function to the signature and verifies that the result is indeed the hash value of the document.
      
The PKI provides a means for swift and efficient responses to verification queries and requests for public encryption keys.
      
Public encryption keys are included by each recipient to make them undeniable when O uses them at the group encryption scheme to distribute key k.
      
更多          


A public key cryptosystem based on the invertibility theory of finite automata is introduced in this paper. The public encryption algorithm is implemented by a (τ+r, τ)-order memory finite automaton M which is the compound t)f a r-order input-memory finite automaton Mψ and a (τ, τ)-order memory finite automaton M1, Mψ being weakly invertible with delay free and Mi being invertible with delay τ, and the secrete decryption algorithm is implemented by the inverse M1' with delay τ of M1' and the weak inverse...

A public key cryptosystem based on the invertibility theory of finite automata is introduced in this paper. The public encryption algorithm is implemented by a (τ+r, τ)-order memory finite automaton M which is the compound t)f a r-order input-memory finite automaton Mψ and a (τ, τ)-order memory finite automaton M1, Mψ being weakly invertible with delay free and Mi being invertible with delay τ, and the secrete decryption algorithm is implemented by the inverse M1' with delay τ of M1' and the weak inverse Mψ' with delay free of Mψ. The security of this finite automaton public key cryptosystem rests on the difficulties of finding weak inverse of nonlinear finite automata and of factoring matrix polynomials. It is also discussed that a scheme to implement digital signatures by this public key cryptosystem.

本文提出一种基于有限自动机可逆性理论的公开钥密码体制,它的公开的加密算法由一个非线性延迟O步弱可逆γ阶输入存储有限自动机M和一个延迟τ步可逆(τ,τ)阶存储线性有限自动机M_1经过复合后所得的(τ+γ,τ)阶存储有限自动机M所实现,它的秘密的解密算法由M_1的延迟τ步逆M_1′和M的延迟O步弱逆M所实现,这种有限自动机公开钥密码体制的保密性建立在求非线性有限自动机的弱逆的困难性和矩阵多项式因式分解的困难性之上,文中又讨论了用这种密码体制建立数字签名的方法。

In this paper, Simmons'result[1,2] is generalized and thusa more severe failure of the CMP has been revealed. That is, if amessage is ever sent to subscribers whose public encryption exponents arerespectively e_(i1), e_(i2),…, e_(ik)(K>1) such that gcd (e_(i1),e_(i2),…,e(ik))=1,then the message can be recovered without breaking the underlyingcryptosystem.

推广了G.J.Simmons关于共模协议失败情形的一个结果,从而揭示了共模协议的一种更一般的失败情形,即若一则消息曾被发送给公开指数分别为e_(i1)·e_(i2),…e_(iK)(K>1)的K个用户,只要gcd(e_(i1),e_(i2),…,e_(iK)=1,那么系统外的任何攻击者在不破译密码体制的情况下便有可能恢复明码消息。

A nwe P3-4 data encryption standard with only ten-bit decimal digit in compute word size of PDX system constructure solves the compatibility problems to network computes and hardware.It possesses NBS' public encryption algorithm standard and has a high safety and practicality.

根据PDX体制构造一种计算机字长只有10位10进数的P3—4新型数据加密标准,解决与网络微机及硬件兼容问题,该加密标准具有NBS的公开加密算法要求指标及高强度安全性和重要的实用性。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关public encryption的内容
在知识搜索中查有关public encryption的内容
在数字搜索中查有关public encryption的内容
在概念知识元中查有关public encryption的内容
在学术趋势中查有关public encryption的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社