Secure hash algorithms are important tools for cryptographic applications such as digital signatures.
安全散列算法是数字签名等密码学应用中重要的工具。
The problem of secure multiparty computation is fundamental in cryptography, as well as relevant to practical cryptographic applications.
安全计算问题是密码学协议研究的基础问题之一,也与很多重要的密码学应用相关。
They have been found to be useful in certain cryptographic applications and in the studies of minimal trellis diagrams of linear block codes.
已发现它们在密码学应用的研究中和线性分组码最小网格图的研究中很有用途。
A key establishment protocol is a protocol whereby a Shared secret becomes available to two or more parties, for subsequent cryptographic applications.
密钥建立协议是为了以后的密码学应用而使一个秘密密钥对两方或更多方都可用的过程。
The proposed algorithms are suitable for software implementations on gener - al-purpose microprocessors, and can be used in public key cryptographic applications such as RSA and ECC.
本文算法主要适用于软件实现,在rsa和ecc等公钥体制实现中有广泛的应用。
This paper mainly does some research in applications of constructing new cryptographic protocols with bilinear pairings.
本文主要研究双线性配对函数在构造新的密码协议方面的应用。
As a fast encryption algorithm, the chaotic cryptographic method has quite wide applications in the field of security.
混沌密码算法是一种快速加密算法,在安全性要求较高的领域中,有着非常广阔的应用前景。
As a fast encryption algorithm, the chaotic cryptographic method has quite wide applications in the field of security.
混沌密码算法是一种快速加密算法,在安全性要求较高的领域中,有着非常广阔的应用前景。
应用推荐