A classical message authenticated encryption protocol based on quantum one-way functions was proposed.
给出了一个基于量子单向函数的非交互式经典消息认证加密协议。
A new efficient ID-based authenticated encryption scheme is proposed, in which some characteristics of bilinear map are used.
利用椭圆曲线上的双线性映射的特性,提出了一个新的基于身份体制的安全有效的认证加密方案。
A new fair exchange protocol with semi-trusted third party is proposed on the basis of a new convertible authenticated encryption scheme.
基于一种可转换的认证加密方法,设计出一种新的包含半可信第三方的公平交换协议。
Smart card is integrated into authenticated encryption scheme, a new cryptographic scheme based on the discrete logarithm problem is presented.
将智能卡技术引入认证加密体制中,提出了一种基于离散对数问题的认证加密方案。
In the most present authenticated encryption schemes the recipient cannot prove the signer "s dishonesty to any verifier if the signer denies the signature."
现有的认证加密方案中,如果签名者否认签名,接收者不能向其它任何验证者证实签名者的诚实性。
A new type of authenticated encryption schemes is proposed. It first combines signature with message recovery schemes and symmetric encryption schemes together.
本文提出了一类新的认证加密方案,这类方案首次将消息可恢复签名和对称加密有机结合。
Based on proxy signature and convertible authenticated encryption scheme, Ren et al. (2005) proposed proxy convertible authenticated encryption and threshold proxy signature scheme.
基于代理签名与可转换认证加密方案,任等(2005)提出了一种代理可转换认证加密和门限代理签名方案。
Ring authenticated encryption scheme can be regarded as the combination of message encryption scheme and ring signature scheme, which has both encryption and ring signatures priority.
环认证加密方案是加密方案与环签名方案的融合,具有这两种方案的优点。
How will Disk Encryption recognize me as an authenticated user?
如何将磁盘加密识别为经过身份验证的用户吗?
The data encryption transmission technology realized by hardware chip was adopted to realize hardware encryption, which was authenticated by the national cryptogram management committee.
在传输方面,采用已通过国家密码管理委员会认证的硬件芯片加密算法的数据加密传输技术实现硬件加密。
You should also check if they would expect authentication (MAC, HMAC, authenticated cipher or a signature) for the symmetric encryption.
您还应该检查他们是否期望对称加密的认证(MAC,HMAC,认证密码或签名)。
You should also check if they would expect authentication (MAC, HMAC, authenticated cipher or a signature) for the symmetric encryption.
您还应该检查他们是否期望对称加密的认证(MAC,HMAC,认证密码或签名)。
应用推荐