该算法安全性高,适合于数据的分组加密。
This algorithm is of high security and suitable for block encrypting of data.
我们已经制定了正式的规范并如第5章描述的一致性算法安全性的证明。
We have developed a formal specification and a proof of safety for the consensus mechanism described in Section 5.
该算法安全性好,且生成的水印序列均值近似于零,为后面两种水印技术做准备。
The algorithms have good security and the mean of watermark sequences is close to zero, preparing for following two algorithms.
在图像脆弱水印技术中,算法安全性、定位精度和篡改恢复效果是主要的研究方向。
In image fragile watermarking technique, the algorithm's security, the accuracy of localization and the capability of recovering tampered region are the main areas of research.
为克服目前基于混沌序列的置乱算法安全性不够高,密钥空间小的缺点,本文提出了一种新的双随机置乱算法。
In this paper, we present a novel encryption algorithm for MPEG audio data including all three layers that is based on a random permutation scheme.
通过适当的说服工作,增加身份验证方案的安全性可以像对当前密码输入代码应用控制算法一样简单。
With the appropriate persuasion, increasing the security of your authentication schemes can be as easy as applying these control algorithms to your current password entry code.
这三个安全性提供者可能已经实现了您需要的算法。
These three security providers may have implemented the algorithms you need.
这篇教程的主旨并不是示范用户身份验证的安全性。取而代之,本文将演示如何在众所周知的登录和创建帐户的算法中使用Xforms。
This tutorial does not purport to be an example of security in user authentication; instead, it will demonstrate the usage of XForms in the well-known algorithm for logging in and account creation.
MD 5密码加密算法支持更为可靠的密码,从而进一步提高了安全性。
The MD5 password encryption algorithm further improved security by allowing more robust passwords. An example of a shadow password entry is below.
可以使用ssl. KeyManagerFactory . algorithm安全性属性配置缺省算法。
The default can be configured using the ssl.KeyManagerFactory.algorithm security property.
安全性组件包含各种安全性算法和机制的IBM实现。
The security components contain IBM implementations of various security algorithms and mechanisms.
算法具有很高的安全性和较好的稳健性。
ECC算法具有高安全性、低消耗、运算速度快的特点,在数字签名领域有良好的应用前景。
With its powerful functions of communications security, low consumption, high operation speed, ECC arithmetic has emerged good applicable future in digital signature domain.
大部分Web开发者和用户仍然忽略了基于浏览器的加密算法带来的在Web应用程序引入传统软件的隐私和安全性的机会。
Web developers and web users are still largely ignoring the opportunity offered by browser-based cryptography to bring the privacy and security of traditional software programs to web applications.
为保证图像数字水印的鲁棒性和安全性,结合加密技术,提出了一种使用协同神经网络的图像数字水印算法。
An digital image watermark algorithm is proposed based on the synergetic neural network, combined with encryption technique, to guarantee its robustness and security.
在此基础上我们构造出快速高效的公钥密码算法,并对该算法进行了安全性和效率分析。
And from which the fast and efficient public-key cryptosystems are constructed, and their security and efficiency are analysed.
仅通过增加加密算法的密钥长度来达到增强安全性已不再是唯一的可行方法。
It is not the only option which to increase the key length of encryption algorithm in order to enhance security.
将对称密码算法和非对称密码算法共同使用,增强了应用系统的安全性。
Using the symmetric algorithms and the asymmetric algorithms together security performance of the application system is improved.
实验结果表明,该算法具有良好的安全性、透明性和鲁棒性。
Experiment results show that the algorithm has good performance on safety, transparence and robustness of watermark .
这两种算法的懦弱性、安全性和定位才能都通过了盘算机试验给与验证。
The frangibility, security and location ability of the two algorithms are all validated by computer simulations.
谷歌仍然认为其研究应该会促使仍在使用这种算法的所有公司远离长期以来被认为安全性很差的SHA - 1。
Google still believes that its research should encourage all companies that are still using this algorithm to stay away from SHA-1, which has long been considered to be very secure.
现代密码学认为,任何加密体系的加密和解密算法都可以公开,其安全性在于密钥的保密性。
It is believed that in modern cryptography, any algorithm of encryption and decryption in cryptographical systems could be public, and the security should rely on the secure key.
ECC算法具有密钥长度短、安全性高、计算效率高等优点,但是ECC算法的实现本身面临着许多问题。
ECC algorithm has some excellences like short key, high security and high efficiency, on the other hand it also faces many questions.
分组对称加密算法的工作模式对于敏感信息的安全性至关重要。
The operation mode of block cipher algorithm is of vital importance for information security.
给出的基于互补矩阵数据隐藏算法在数据隐藏量和安全性两方面都有良好性能。
The complementary matrix-based algorithm for data hiding presented does a good job at capacity of data hiding and data security.
RSA算法的安全性依赖于大数的因数分解的困难性。
The safe of RSA algorithm based on difficulty in the large number factorization.
在这一部分还简要的描述了RSA算法的性能分析和安全性分析。
Return the function analysis and safety analysis that the synopsis described the calculate way of RSA in this part.
它与RSA算法相似,其安全性基于大数因式分解的难度,能够抵抗对于RSA的选择密文攻击,并且易于软件实现。
Its (security) is based on the intractability of the integer factorization problem as RSA, and it is able to resist the chosen-ciphertext attack against RSA and easy to be implemented.
介绍基于对称密码系统的可证明安全理论,利用平方哈希函数实现技术,对一种可证明安全算法DFC实施改进后,安全性没有损失,但是速度得到了提高。
In this paper, based on provable security theory, a provable security cipher DFC is improved on speed without lost of security by means of fast implementation of square hash function.
为了提高算法的随机性和安全性,引进了混沌技术。
To enhance the security and random of the proposed scheme chaos map is applied.
应用推荐