• Secure hash algorithms are important tools for cryptographic applications such as digital signatures.

    安全散列算法数字签名密码学应用中重要工具

    youdao

  • The problem of secure multiparty computation is fundamental in cryptography, as well as relevant to practical cryptographic applications.

    安全计算问题密码学协议研究基础问题之一与很多重要的密码学应用相关

    youdao

  • They have been found to be useful in certain cryptographic applications and in the studies of minimal trellis diagrams of linear block codes.

    发现它们密码学应用研究中和线性分组最小网格研究中有用途。

    youdao

  • A key establishment protocol is a protocol whereby a Shared secret becomes available to two or more parties, for subsequent cryptographic applications.

    密钥建立协议为了以后的密码学应用而使一个秘密密钥多方都可用的过程。

    youdao

  • The proposed algorithms are suitable for software implementations on gener - al-purpose microprocessors, and can be used in public key cryptographic applications such as RSA and ECC.

    本文算法主要适用软件实现rsaecc公钥体制实现中广泛的应用

    youdao

  • This paper mainly does some research in applications of constructing new cryptographic protocols with bilinear pairings.

    本文主要研究线性配对函数构造新的密码协议方面应用

    youdao

  • As a fast encryption algorithm, the chaotic cryptographic method has quite wide applications in the field of security.

    混沌密码算法一种快速加密算法,安全性要求较高领域有着非常广阔应用前景

    youdao

  • As a fast encryption algorithm, the chaotic cryptographic method has quite wide applications in the field of security.

    混沌密码算法一种快速加密算法,安全性要求较高领域有着非常广阔应用前景

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定