It is the basis of the public cryptography.
这是现在通用的公共加密系统的基础。
One-way trapdoor function has impotents applications in public cryptography.
单向限门函数在公钥密码学中有着重要的应用。
Based on the public key encryption, the elliptic curve cryptography (ECC) is the highest security encryption based on each bit and it is considered as the next multipurpose public cryptography.
基于公钥密码系统的椭圆曲线密码系统(ECC)是迄今为止每比特具有最高安全强度的密码系统,被认为是下一代通用的公钥密码系统。
Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.
由于数字签名是建立在公用密钥密码术基础上的,因此计算一个数字签名所花的时间往往要比计算一个mac长得多。
Digital signatures rely on public key cryptography.
数字签名依赖于公共密钥加密学。
Appendix 4: Public-key cryptography terminology.
附录4:公钥加密术语。
Asymmetric cryptography: Public-key cryptography (these two terms are synonyms).
不对称加密:公钥加密(这两个术语是同义词)。
Two public-key cryptography algorithms that are widely used are RSA (named after its inventors Rivest, Shamir and Adleman) and DSA (Digital Signature Algorithm).
两个广泛使用的公钥加密算法是RSA(根据其发明者Rivest、Shamir和Adleman 命名)和DSA(数字签名算法)。
While this doesn't sound like a big deal, the difficulty of factoring and finding a discrete logarithm forms the basis of most if not all public-key cryptography systems.
虽然听起来这并不是什么了不起的事,但分解并找到一个离散对数的困难形成了大部分公用密钥密码学系统的基础,如果不是全部的话。
This approach involving private and public key pairs is also known as public key cryptography.
这种涉及到私钥和公钥对的方式也被称作公钥密码术。
Digital signatures are used to verify that the message was actually sent by the sender; they combine the use of message digests and public key cryptography.
数字签名用于验证消息是否真正由发送方发送;数字签名结合了消息摘要和公钥密码术的使用。
The SSL protocol is based on public-key cryptography where encryption keys come in pairs that are mathematically related, but one cannot be deduced from knowing the other.
SSL协议基于公钥密码,加密密钥成对地出现在公钥密码中,它们是在数学上是相关的,但无法由一个推知另一个。
The transmitted data is encrypted using public key (asymmetric) cryptography so that only the holder of the corresponding private key can decrypt the data.
传递的数据使用公钥(非对称)加密算法加密,所以只有对应私钥的持有者才能解密数据。
RSA public-key cryptography is based on this property of factorization.
RSA公钥密码系统就是基于这种因数分解特性的。
I've explained enough about security, encryption techniques, and even public-key cryptography to help make your next PHP project a success.
我们对安全性、加密技术,甚至公钥加密技术介绍了很多,目的是帮助您成功开发下一个PHP项目。
The security services that public key cryptography enable are based on the fact that a message encrypted using the public key can only be decrypted by the corresponding private key, and vice versa.
公钥密码启用的安全性服务是基于这样的消息解密机制,即共有密钥只能通过相应的私有密钥才能解密,反之亦然。
Many application platforms allow the use of public key cryptography to encrypt, send, and decrypt messages with relative ease.
很多应用程序平台都支持通过使用公钥加密相对容易地对消息进行加密、发送和解密。
However, public key Cryptography takes things a step further and introduces the idea of signed public keys.
然而,公钥密码术更进一步,它引入了签名公钥的概念。
A few changes are needed to support using WS-Security public-key cryptography features, though, so a separate code package accompanies this article (see Download).
但是,需要作出一些修改来支持使用WS - Security公开密匙加密特性,因此本文附带了一个单独的代码包(见下载)。
But first, I'll give you a quick rundown of the principles of public-key cryptography - the basis for most of WS-Security's encrypting and signing features.
但是,我们首先将扼要概述一下公开密匙加密的原理—这是WS - Security的加密和签名特性的主要基础。
Public key cryptosystem is one of the most important research subject in modern cryptography.
公钥密码系统是现代密码学最重要的研究课题之一。
The scheme perfectly integrates digital signature scheme with public key cryptography system.
该方案是数字签名与公钥密码体制的有机集成。
Elliptic Curve Cryptography (ECC) has the highest safety strength of private key per bit in the Public-Key Cryptography recently.
椭圆曲线密码体制是目前公钥体制中每比特密钥安全强度最高的一种密码体制。
In the following example involving Alice and Bob, public key cryptography is easily used to verify identity.
在下列例子中包括甲和乙,公钥加密会轻松地校验身份。
The cryptographic algorithm is public in modern cryptography.
现代密码体制中,加密算法是公开的。
PKI ( Public Key Infrastructure), which is on the base of cryptography, resolved the issue of trust perfectly using public key certificate as a carrier.
公钥基础设施)以密码学为理论基础,以公钥证书为载体,较好地解决了网络中的信任问题。
Some applications try to combine public - and secret-key cryptography to achieve security and performance.
有些应用试图把明钥和秘钥密码术结合起来,以获得安全性和高性能。
Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin.
公钥密码技术结合传统的对称密码技术及信息摘要技术,可提供信息的保密性、完整性和信源确认,是多种安全应用的基础。
Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin.
公钥密码技术结合传统的对称密码技术及信息摘要技术,可提供信息的保密性、完整性和信源确认,是多种安全应用的基础。
应用推荐