An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.
对称密钥(公钥)算法用于交换在对称算法中使用的加密密钥,以及用于数字签名。
A two-phase process using both symmetric and asymmetric algorithms.
使用对称算法和非对称算法的两阶段过程。
Because this is using asymmetric encryption, where each side has its own certificate and private key, it should be somewhat simpler to handle than the Listing 5 symmetric-encryption example.
因为这是使用非对象加密技术,而每一端有自己的证书和私有密钥,比起清单5对称加密技术示例,它处理起来更为简单。
The difference between symmetric and asymmetric encryption
对称和非对称加密间的差异
One disadvantage of asymmetric keys is that they take much longer to encrypt a message than do symmetric keys, and the encryption time is directly proportional to the size of the message.
非对称密钥的一个缺点是加密消息要比对称密钥花费更长的时间,而且加密时间直接与消息的长短成正比。
BindingAssertionHandler, shown in Listing 5, is a common base for handling verification of all three types of binding assertions (transport, asymmetric, and symmetric).
如清单5所示,BindingAssertionHandler是一个支持全部三种绑定断言(transport、asymmetric和symmetric)的通用基类。
This hash value is what's finally included in the actual signature, and generating the signature is the only step for which symmetric vs. asymmetric encryption is any different.
hash值最终包含在实际签名中,生成的签名是非对称与对称仅有的不同之处。
The equations of motion and kinematic equations under various landing conditions, including symmetric impact and asymmetric impact are provided.
并对其初始条件、对称着陆及不对称着陆情况作了动力学分析。
Using the symmetric algorithms and the asymmetric algorithms together security performance of the application system is improved.
将对称密码算法和非对称密码算法共同使用,增强了应用系统的安全性。
The transfer formula between asymmetric tolerance marking and symmetric tolerance marking is deduced by the mathematical method.
利用数学方法,推导不对称公差标注与对称公差标注间的转换公式。
The influences of symmetric, asymmetric and double mountains on the frontogenetical process of a cold front are studied by using a semigeostrophic model.
本文利用半地转模式研究了对称和非对称地形以及双地形对冷锋锋生过程的影响。
Through the simulations of three phases under the conditions of PT symmetric and asymmetric, the effect of excitation characteristics of three phases' PT on ferroresonance is concluded.
通过三相pt对称和不对称两种情况下的计算,得到互感器三相励磁特性对铁磁谐振的影响。
Both symmetric and asymmetric SPIR synapses were observed in the marginal division.
在边缘区内可观察到对称型和非对称型两种突触。
Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.
目前有几种加密技术如对称密钥密码系统和非对称密钥密码系统。
In other words, a single symmetric key can be encrypted by using multiple certificates, passwords, symmetric keys, and asymmetric keys at the same time.
换言之,可以同时使用多个证书、密码、对称密钥以及非对称密钥对单个对称密钥进行加密。
Four known damage patterns, including single, symmetric, asymmetric and multi-story damages, are simulated by removing corresponding braces.
通过拆除斜撑,模拟了单损伤、对称多损伤、非对称多损伤以及多层损伤四种损伤模式。
The calculations covered symmetric and asymmetric, stable and unstable resonators.
计算的腔包括对称与非对称的、稳定与非稳定的。
The two main competing cryptography schemes are known as the secret-key (symmetric) system and the public-key (asymmetric) system.
现有两种主要的、相互竞争着的密码术,被称作秘钥(即对称)系统和明钥(即不对称)系统。
This paper mainly introduces the basic dynamic models of evolutionary game theory: symmetric replicator dynamic model, asymmetric replicator dynamic model and some conclusions.
介绍进化博弈理论的基本动态模型:对称博弈模仿者动态模型和非对称博弈模仿者动态模型及其相关结论。
This section describes how to generate and manage keys for both symmetric and asymmetric algorithms.
本节描述如何为对称算法和不对称算法生成和管理密钥。
Comparison and analysis of the respective information both symmetric and asymmetric circumstances, whether the buyback contract makes supply chain coordination.
分别比较和分析了两种信息对称和不对称情况下,供应链回购契约是否使得供应链达到协调。
This paper is devoted to some typical asymmetric watermarks and some basic characteristics of asymmetric watermark and symmetric watermark.
分析了几种典型的对称数字水印算法,并且对对称水印加密算法和非对称水印加密算法的特点进行比较分析。
The stability of the, symmetric and asymmetric rotational discontinuities with electron sense of rotation is studied by means of a one dimensional hybrid particle simulation code.
用一维混合粒子编码研究了具有电子旋转方向的对称和非对称旋转间断的稳定性。
Difference exists between the maximum absorbency of the asymmetric dyes and the average of the maximum absorbency of the corresponding symmetric ones.
其中合成的不对称染料的最大吸收波长不是相应两个对称染料最大吸收波长的算数平均值,扩大了防光晕染料的选择范围。
It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.
密码技术主要包括对称密码算法和非对称密码算法及协议。
To communicate a symmetric key and IV to a remote party, you would usually encrypt the symmetric key and IV using asymmetric encryption.
若要与远端的一方沟通对称金钥和IV,通常会使用非对称加密来加密对称金钥和IV。
Explains how to do symmetric and asymmetric encryption.
说明如何进行对称和非对称加密。
Explains how to do symmetric and asymmetric decryption.
说明如何进行对称和非对称解密。
Using a developed modified influence function method, the cold rolling of thin strip in both symmetric and asymmetric cases were analysed with considering work roll edge contact.
在考虑工作辊边部接触的前提下,采用自行开发的改良影响函数法对薄带的对称和非对称冷轧过程进行了分析。
Using a developed modified influence function method, the cold rolling of thin strip in both symmetric and asymmetric cases were analysed with considering work roll edge contact.
在考虑工作辊边部接触的前提下,采用自行开发的改良影响函数法对薄带的对称和非对称冷轧过程进行了分析。
应用推荐