• Digital signatures rely on public key cryptography.

    数字签名依赖公共密钥加密学

    youdao

  • Be signed with a strong name using standard public key cryptography.

    使用标准公钥密码系统名称签名

    youdao

  • This asymmetry is the property that makes public key cryptography so useful.

    这个非对称特性使得公钥加密有用。 。

    youdao

  • The scheme perfectly integrates digital signature scheme with public key cryptography system.

    方案数字签名公钥密码体制的有机集成。

    youdao

  • This approach involving private and public key pairs is also known as public key cryptography.

    这种涉及到私钥公钥方式称作公钥密码术

    youdao

  • The set registry tool allows you to change the registry Settings for public key cryptography.

    设置注册工具使得以更改公钥密码注册表设置

    youdao

  • The wide use of public key cryptography requires the ability to verify the authenticity of public keys.

    公钥密码学广泛应用使得公钥真实性验证性成为必要条件。

    youdao

  • However, public key Cryptography takes things a step further and introduces the idea of signed public keys.

    然而公钥密码术更进一步,它引入签名公钥概念

    youdao

  • In the following example involving Alice and Bob, public key cryptography is easily used to verify identity.

    下列例子包括公钥加密轻松地校验身份。

    youdao

  • Certificateless public key cryptography resolves the key escrow problem and public key authentication problem.

    无证书公钥密码体制解决密钥托管问题公钥认证问题。

    youdao

  • Based on the public key cryptography, a mobile communication protocol providing end - to - end security is provided.

    基于公钥加密体制,本文提出了一种具有移动终端安全性的无线通讯协议

    youdao

  • The public key cryptography can just solve these problems, but it is much slower than the symmetric key cryptography.

    公钥密码算法正好可以解决方面的问题速度上远远不及对称密码算法。

    youdao

  • Many application platforms allow the use of public key cryptography to encrypt, send, and decrypt messages with relative ease.

    很多应用程序平台都支持通过使用公钥加密相对容易地消息进行加密、发送解密

    youdao

  • Based on the ideas of public key cryptography, a new scrambling technology of digital image based on primitive roots is given.

    密码学中的公钥思想为基础,提出了一种基于数字图像置乱技术

    youdao

  • This scheme is based on the theory of public key cryptography, with some algorithms about RSA, Hash Digest and digital envelop.

    方案主要以目前比较成熟公钥密钥学理论为基础到了RSA加解密、摘要、数字信封等算法。

    youdao

  • Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.

    由于数字签名建立公用密钥密码术基础上的,因此计算个数字签名所花时间往往要比计算一个mac长得多。

    youdao

  • Digital signatures are used to verify that the message was actually sent by the sender; they combine the use of message digests and public key cryptography.

    数字签名用于验证消息是否真正发送发送;数字签名结合消息摘要公钥密码术使用

    youdao

  • A new invisible watermarking technique which could localize tampered areas for image authentication was proposed, based on image feature and public key cryptography.

    提出基于图像特征公钥密码系统的易损水印算法,图像认证能够定位图像被篡改的位置。

    youdao

  • In this paper, the principles of digital signature is given, Meanwhile the key technology of digital signature: public key cryptography and Hash algorithms is introduced.

    文章阐述数字签名技术原理并介绍了数字签名中的关键技术:公钥加密体制哈希算法

    youdao

  • Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin.

    公钥密码技术结合传统对称密码技术信息摘要技术提供信息保密性完整性确认,是多种安全应用的基础。

    youdao

  • Most security applications are increasingly using public key cryptography. It leads to a pressing need for a PKI (public key Infrastructure) to support the distribution of public keys.

    大多数安全应用现在都引入公钥密码算法,而公钥密码算法需要公钥基础设施PK I支持公钥分发

    youdao

  • In this paper, we propose a novel secure multicast scheme with key agreement based on Elliptic Curve Cryptosystem and group communication inside Identity-based Public key Cryptography system.

    提出一个应用椭圆曲线密码体制进行密钥协商在基于身份的公钥系统进行通信全新安全组播方案

    youdao

  • Public key infrastructures (PKI) achieve authentication and key exchange by utilizing public key cryptography; however, the system's centralized models tend to be the bottleneck in the network.

    公钥基础设施(PKI)通过公钥算法来实现身份认证密钥交换由于其采用集中管理模式容易成为网络访问瓶颈

    youdao

  • The security services that public key cryptography enable are based on the fact that a message encrypted using the public key can only be decrypted by the corresponding private key, and vice versa.

    公钥密码启用安全性服务基于这样的消息解密机制,共有密钥只能通过相应私有密钥才能解密,反之亦然。

    youdao

  • It seems that braid group is a kind of considerable public key cryptography platform, but current key agreement protocols, such as AAG, AAFG and BDH, all have different degrees of security weaknesses.

    辫子种新兴适用于量子计算机时代的公钥密码平台但是目前基于辫子群的密钥协商协议AAGAAFGBDH不同程度的安全弱点。

    youdao

  • While this doesn't sound like a big deal, the difficulty of factoring and finding a discrete logarithm forms the basis of most if not all public-key cryptography systems.

    虽然起来不是什么了不起事,但分解找到一个离散对数困难形成大部分公用密钥密码学系统的基础如果不是全部的话。

    youdao

  • Two public-key cryptography algorithms that are widely used are RSA (named after its inventors Rivest, Shamir and Adleman) and DSA (Digital Signature Algorithm).

    两个广泛使用公钥加密算法RSA(根据发明者RivestShamirAdleman 命名)和DSA数字签名算法)。

    youdao

  • Two public-key cryptography algorithms that are widely used are RSA (named after its inventors Rivest, Shamir and Adleman) and DSA (Digital Signature Algorithm).

    两个广泛使用公钥加密算法RSA(根据发明者RivestShamirAdleman 命名)和DSA数字签名算法)。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定