• 协议安全性基于使用公钥加密方案

    Accordingly, the protocol security is rested on the used underlying public cryptosystems.

    youdao

  • 密码学领域一个有名难题--20世纪70年代著名RSA公钥加密方案开发人员提出的。

    The problem was a famous one in the fieldit had been proposed in the late 1970s by developers of the famous RSA public key encryption scheme.

    youdao

  • 为了更简单准确地判断公钥加密方案IND-CCA2安全性提出了IND-CCA2安全性的灰盒分析法

    To evaluate the IND-CCA2 security of public key encryption schemes, proposed the gray-box analysis of IND-CCA2 security.

    youdao

  • 公钥方案非常有趣,因为使用公钥加密数据只能相关私钥进行解密。

    The public and private key scheme is interesting because data encrypted with a public key can only be decrypted with the associated private key.

    youdao

  • 方案不仅支持系统人员设备密钥管理身份认证公钥密码运算,而且加密密钥进行管理。

    This scheme not only supports secret key management and identity authentication of personnel and equipment, but also constructs secret key management center and manages encrypted key of the system.

    youdao

  • 为了提供保密性认证功能,签字加密方案基本密码学工具,特别是公钥密码体制中。

    Encryption and signature schemes are fundamental cryptographic tools for providing privacy and authenticity respectively, respectively, in the public-key setting.

    youdao

  • 并通过RSA公钥密码算法的改进给出一种新的加密方法进而给出相应密钥管理方案

    Through some improvement to the RSA public key system, a new method of multicast encryption is put forward and then corresponding key management model is given.

    youdao

  • 目前基于公钥加密会话密钥交换方案容易受到中间人攻击且效率不

    Most current cryptography and session key exchange schemes based on public key are vulnerable to intermediate attack and have low efficiency.

    youdao

  • 这个方案采用公钥体制敏感路由信息进行认证加密只有产生路由请求信息RREQ节点才能验证这些敏感信息。

    Using the Asymmetric Cryptographic System, we can authenticate and encrypt sensitive routing messages, and only source nodes which issue RREQ can validate messages.

    youdao

  • 公钥加密算法追踪算法结合在一起,构成公钥广播加密方案

    A public key tracing and revocation scheme can combine the public key encryption with the traitor tracing algorithm.

    youdao

  • 方案对称加密算法、椭圆曲线公钥加密算法单向函数有机结合实现了用户使用权限和关键敏感字段的安全级别关联

    Here we give a simpler implement, which encrypts the sensitive data at each level with a key unique to that level, whose security is based on elliptic curve discrete logarithm problem.

    youdao

  • 利用组合公钥体制(CPK基本思想,结合椭圆曲线加密ECC算法提出一种改进数字签名方案

    This paper represents an improved method of digital signature, which is based on the principle of combined public key(CPK) and combined with the algorithm of elliptic curve cryptosystem(ECC).

    youdao

  • 提出一个完全式公钥广播加密方案

    This paper proposes a fully public key tracing and revocation scheme.

    youdao

  • 方案数字签名公钥加密有机集成,除了具有认证性、保密性外,还具有计算通信量等特点。

    The scheme perfectly integrates digital signature scheme with public key cryptosystem, it has authentication, secrecy, less computation cost and less communication cost.

    youdao

  • 方案数字签名公钥加密有机集成,除了具有认证性、保密性外,还具有计算通信量等特点。

    The scheme perfectly integrates digital signature scheme with public key cryptosystem, it has authentication, secrecy, less computation cost and less communication cost.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定