• The outer layers (people) depend on middle layers (computers and networks), which in turn rely on the innermost layers (cryptography and protocols).

    外层依赖中间层计算机网络),中间层依赖于最里层密码学协议)。

    youdao

  • This work presents a dual-core two-field elliptic curve cryptosystem supporting several elliptic curve cryptography(ECC) protocols to accelerate signature generation and verification.

    为了加快签名验证的速度,给出了一种支持多种椭圆曲线密码ECC协议双核双域ECC处理器结构。

    youdao

  • Cryptography is the core domain in the information security technique. It provides many algorithms and protocols to meet practical need.

    密码学作为信息安全技术核心领域,提供多种密码算法应用协议满足人们实际应用的需要。

    youdao

  • Knowledge of cryptography, include algorithms and protocols.

    了解密码学算法以及协议

    youdao

  • It seems that braid group is a kind of considerable public key cryptography platform, but current key agreement protocols, such as AAG, AAFG and BDH, all have different degrees of security weaknesses.

    辫子种新兴适用于量子计算机时代的公钥密码平台但是目前基于辫子群的密钥协商协议AAGAAFGBDH不同程度的安全弱点。

    youdao

  • In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议

    youdao

  • Menezes, et al. Handbook of Applied Cryptography, "Key Establishment Protocols. " Chapter 12. CRC Press, 2001.

    应用密码学手册, “密钥建构协定”第十,2001年CRC出版社

    youdao

  • Menezes, et al. Handbook of Applied Cryptography, "Key Establishment Protocols. " Chapter 12. CRC Press, 2001.

    应用密码学手册, “密钥建构协定”第十,2001年CRC出版社

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定