• 提出两个抗选择密文攻击门限密码系统

    Two threshold cryptosystems secure against chosen ciphertext attacks are proposed.

    youdao

  • 随机预言模型下,方案适应性选择密文攻击可证明安全的。

    In the random oracle model, the scheme is provably secure against adaptive chosen ciphertext attacks.

    youdao

  • 高密度随机背包困难性假设,可以证明方案在唯密文攻击安全的。

    Under the assumption that the random high-density knapsack problem is infeasible, the proposed schemes are provably secure against ciphertext-only attack.

    youdao

  • 此外,证明方案加密算法DDH假设适应性选择密文攻击安全的。

    The encryption algorithm in the scheme is semantically secure against adaptive chosen cipher-text attacks based on the DDH assumption.

    youdao

  • 方案认为适应性选择密文攻击实用方案之一缺乏严格安全性证明

    This scheme is regarded as one of practical schemes against adaptively chosen ciphertext attacks, but it is absent of rigorous proofs.

    youdao

  • 分析表明,该文所设计的加密算法不但抵抗密文攻击而且有效地抵抗选择明文攻击

    The analysis indicates that the encryption algorithm not only can effectively resist cipher-text-only attack but also chosen-plaintext attack.

    youdao

  • 选择密文攻击公钥密码体制安全性很高的密码体制,它是设计主动攻击协议非常有用的工具。

    The public key cryptosystem secure against chosen ciphertext attacks is a very strong secure cryptosystem and is a useful primitive for designing protocols that resisting active adversary.

    youdao

  • RSA算法相似,其安全性基于大数因式分解难度,能够抵抗对于RSA的选择密文攻击,并且易于软件实现

    Its (security) is based on the intractability of the integer factorization problem as RSA, and it is able to resist the chosen-ciphertext attack against RSA and easy to be implemented.

    youdao

  • 由于敏感数据加密,任何直接数据库文件进行分析攻击方式,都只能看到密文

    Because the sensitive data is encrypted, any direct attack on the database file analysis, can only see the ciphertext.

    youdao

  • 同时传统加密技术所得到的密文容易攻击发现,影响信息安全性

    Meanwhile, it is easy to discover cryptograph by traditional encryption technology by attacker and it affects security of information.

    youdao

  • 详细阐述了其加密原理密文索引结构重复性数据加密处理算法攻击进行了分析。

    The encryption principle and index structure of encryption data are developed. The encryption processing of duplicate data and algorithm exposure are analyzed.

    youdao

  • 此外只有持有第三签名接收者才能打开密文避免了攻击消息的窃取

    In addition, the receiver can decrypt the message only if she has the trusted third party's signature, avoiding an attacker to steal the message to a certain degree.

    youdao

  • 对分组密码的工作模式进行了攻击,结果表明如果攻击询问电码本(ECB)问答器,则容易攻破密文分组连接模式(PCBC);

    We show that when the attacker has access to an electronic codebook(ECB)oracle, the plaintext cipher block chaining mode(PCBC) can be easily attacked;

    youdao

  • 对分组密码的工作模式进行了攻击,结果表明如果攻击询问电码本(ECB)问答器,则容易攻破密文分组连接模式(PCBC);

    We show that when the attacker has access to an electronic codebook(ECB)oracle, the plaintext cipher block chaining mode(PCBC) can be easily attacked;

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定