• The security services that public key cryptography enable are based on the fact that a message encrypted using the public key can only be decrypted by the corresponding private key, and vice versa.

    公钥密码启用安全性服务基于这样的消息解密机制,共有密钥只能通过相应私有密钥才能解密,反之亦然。

    youdao

  • This approach involving private and public key pairs is also known as public key cryptography.

    这种涉及到私钥公钥方式称作公钥密码术

    youdao

  • The transmitted data is encrypted using public key (asymmetric) cryptography so that only the holder of the corresponding private key can decrypt the data.

    传递数据使用公钥(非对称)加密算法加密所以只有对应持有者才能解密数据。

    youdao

  • Elliptic Curve Cryptography (ECC) has the highest safety strength of private key per bit in the Public-Key Cryptography recently.

    椭圆曲线密码体制是目前公钥体制比特密钥安全强度最高的一种密码体制。

    youdao

  • Public Key and Asymmetric - Public-key cryptography uses a pair of keys, one that is designated the private key and kept secret, the other key is called the public key and is generally made available.

    公钥对称公钥密码学使用一对密钥,其中个定义加密存放另外一个称为公钥,通常无须加密。

    youdao

  • Create a new Private Key and select the defaults for configuring Cryptography and your CA Name.

    创建新的专用密钥然后选择配置加密CA名称的默认值。

    youdao

  • Asymmetric keys are used in public-key cryptography, which USES two keys, a public key and a private key, which are related mathematically.

    非对称密钥用于公钥加密,公钥加密使用两个密钥,即在数学上相关公钥个私

    youdao

  • Asymmetric keys are used in public-key cryptography, which USES two keys, a public key and a private key, which are related mathematically.

    非对称密钥用于公钥加密,公钥加密使用两个密钥,即在数学上相关公钥个私

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定