• Appendix 4: Public-key cryptography terminology.

    附录4公钥加密术语

    youdao

  • RSA public-key cryptography is based on this property of factorization.

    RSA公钥密码系统就是基于这种因数分解特性

    youdao

  • Asymmetric cryptography: Public-key cryptography (these two terms are synonyms).

    不对称加密公钥加密(两个术语同义词)。

    youdao

  • It's sort of like those probabilistic tests used to produce large prime Numbers for public-key cryptography.

    类似那些用来公开密匙系统产生质数概率测试

    youdao

  • The area and speed of cryptography coprocessor impede the application of public-key cryptography RSA for smart card.

    密码处理器的面积过大速度较慢制约公钥密码体制RSA智能卡中的应用

    youdao

  • Elliptic Curve Cryptography (ECC) has the highest safety strength of private key per bit in the Public-Key Cryptography recently.

    椭圆曲线密码体制是目前公钥体制比特密钥安全强度最高的一种密码体制。

    youdao

  • I've explained enough about security, encryption techniques, and even public-key cryptography to help make your next PHP project a success.

    我们安全性加密技术,甚至公钥加密技术介绍了很多,目的是帮助成功开发一个PHP项目

    youdao

  • But first, I'll give you a quick rundown of the principles of public-key cryptography - the basis for most of WS-Security's encrypting and signing features.

    但是我们首先扼要概述一下公开密加密原理WS - Security加密签名特性主要基础

    youdao

  • Two public-key cryptography algorithms that are widely used are RSA (named after its inventors Rivest, Shamir and Adleman) and DSA (Digital Signature Algorithm).

    两个广泛使用公钥加密算法RSA(根据发明者RivestShamirAdleman 命名)和DSA数字签名算法)。

    youdao

  • A few changes are needed to support using WS-Security public-key cryptography features, though, so a separate code package accompanies this article (see Download).

    但是需要作出一些修改支持使用WS - Security公开密加密特性因此本文附带了一个单独代码(下载)。

    youdao

  • While this doesn't sound like a big deal, the difficulty of factoring and finding a discrete logarithm forms the basis of most if not all public-key cryptography systems.

    虽然起来不是什么了不起事,但分解找到一个离散对数困难形成大部分公用密钥密码学系统的基础如果不是全部的话。

    youdao

  • The SSL protocol is based on public-key cryptography where encryption keys come in pairs that are mathematically related, but one cannot be deduced from knowing the other.

    SSL协议基于公钥密码,加密密钥成对出现公钥密码中,它们是在数学上相关的,无法由个推知另一个。

    youdao

  • An area efficient modular arithmetic processor was developed that is capable of performing RSA public-key cryptography and other modular arithmetic operations as a coprocessor.

    为以较小面积代价实现RSA公钥密码算法其他一些算法所需的求、模加、乘、模幂等运算,该文设计了一种可作为处理器使用的模运算处理器。

    youdao

  • A dynamic password authentication which is based on the Chinese remainder theorem and RSA public-key cryptography are represented. Finally analysis is made on the scheme security and feasibility.

    最后提出一种基于公钥密码中国剩余定理动态口令验证方案进行方案安全性性能的分析

    youdao

  • Public Key and Asymmetric - Public-key cryptography uses a pair of keys, one that is designated the private key and kept secret, the other key is called the public key and is generally made available.

    公钥对称公钥密码学使用一对密钥,其中个定义加密存放另外一个称为公钥,通常无须加密。

    youdao

  • Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.

    由于数字签名建立公用密钥密码术基础上的,因此计算个数字签名所花时间往往要比计算一个mac长得多。

    youdao

  • Digital signatures rely on public key cryptography.

    数字签名依赖公共密钥加密学

    youdao

  • Digital signatures are used to verify that the message was actually sent by the sender; they combine the use of message digests and public key cryptography.

    数字签名用于验证消息是否真正发送发送;数字签名结合消息摘要公钥密码术使用

    youdao

  • This approach involving private and public key pairs is also known as public key cryptography.

    这种涉及到私钥公钥方式称作公钥密码术

    youdao

  • The transmitted data is encrypted using public key (asymmetric) cryptography so that only the holder of the corresponding private key can decrypt the data.

    传递数据使用公钥(非对称)加密算法加密所以只有对应持有者才能解密数据。

    youdao

  • The security services that public key cryptography enable are based on the fact that a message encrypted using the public key can only be decrypted by the corresponding private key, and vice versa.

    公钥密码启用安全性服务基于这样的消息解密机制,共有密钥只能通过相应私有密钥才能解密,反之亦然。

    youdao

  • Many application platforms allow the use of public key cryptography to encrypt, send, and decrypt messages with relative ease.

    很多应用程序平台都支持通过使用公钥加密相对容易地消息进行加密、发送解密

    youdao

  • However, public key Cryptography takes things a step further and introduces the idea of signed public keys.

    然而公钥密码术更进一步,它引入签名公钥概念

    youdao

  • The scheme perfectly integrates digital signature scheme with public key cryptography system.

    方案数字签名公钥密码体制的有机集成。

    youdao

  • In the following example involving Alice and Bob, public key cryptography is easily used to verify identity.

    下列例子包括公钥加密轻松地校验身份。

    youdao

  • The wide use of public key cryptography requires the ability to verify the authenticity of public keys.

    公钥密码学广泛应用使得公钥真实性验证性成为必要条件。

    youdao

  • It seems that braid group is a kind of considerable public key cryptography platform, but current key agreement protocols, such as AAG, AAFG and BDH, all have different degrees of security weaknesses.

    辫子种新兴适用于量子计算机时代的公钥密码平台但是目前基于辫子群的密钥协商协议AAGAAFGBDH不同程度的安全弱点。

    youdao

  • It seems that braid group is a kind of considerable public key cryptography platform, but current key agreement protocols, such as AAG, AAFG and BDH, all have different degrees of security weaknesses.

    辫子种新兴适用于量子计算机时代的公钥密码平台但是目前基于辫子群的密钥协商协议AAGAAFGBDH不同程度的安全弱点。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定