• Two public-key cryptography algorithms that are widely used are RSA (named after its inventors Rivest, Shamir and Adleman) and DSA (Digital Signature Algorithm).

    两个广泛使用公钥加密算法RSA(根据发明者RivestShamirAdleman 命名)和DSA数字签名算法)。

    youdao

  • Asymmetric cryptography: Public-key cryptography (these two terms are synonyms).

    不对称加密公钥加密(两个术语同义词)。

    youdao

  • While this doesn't sound like a big deal, the difficulty of factoring and finding a discrete logarithm forms the basis of most if not all public-key cryptography systems.

    虽然起来不是什么了不起事,但分解找到一个离散对数困难形成大部分公用密钥密码学系统的基础如果不是全部的话。

    youdao

  • Digital signatures are used to verify that the message was actually sent by the sender; they combine the use of message digests and public key cryptography.

    数字签名用于验证消息是否真正发送发送;数字签名结合消息摘要公钥密码术使用

    youdao

  • The transmitted data is encrypted using public key (asymmetric) cryptography so that only the holder of the corresponding private key can decrypt the data.

    传递数据使用公钥(非对称)加密算法加密所以只有对应持有者才能解密数据。

    youdao

  • The SSL protocol is based on public-key cryptography where encryption keys come in pairs that are mathematically related, but one cannot be deduced from knowing the other.

    SSL协议基于公钥密码,加密密钥成对出现公钥密码中,它们是在数学上相关的,无法由个推知另一个。

    youdao

  • RSA public-key cryptography is based on this property of factorization.

    RSA公钥密码系统就是基于这种因数分解特性

    youdao

  • Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.

    由于数字签名建立公用密钥密码术基础上的,因此计算个数字签名所花时间往往要比计算一个mac长得多。

    youdao

  • I've explained enough about security, encryption techniques, and even public-key cryptography to help make your next PHP project a success.

    我们安全性加密技术,甚至公钥加密技术介绍了很多,目的是帮助成功开发一个PHP项目

    youdao

  • Many application platforms allow the use of public key cryptography to encrypt, send, and decrypt messages with relative ease.

    很多应用程序平台都支持通过使用公钥加密相对容易地消息进行加密、发送解密

    youdao

  • Digital signatures rely on public key cryptography.

    数字签名依赖公共密钥加密学

    youdao

  • The security services that public key cryptography enable are based on the fact that a message encrypted using the public key can only be decrypted by the corresponding private key, and vice versa.

    公钥密码启用安全性服务基于这样的消息解密机制,共有密钥只能通过相应私有密钥才能解密,反之亦然。

    youdao

  • This approach involving private and public key pairs is also known as public key cryptography.

    这种涉及到私钥公钥方式称作公钥密码术

    youdao

  • However, public key Cryptography takes things a step further and introduces the idea of signed public keys.

    然而公钥密码术更进一步,它引入签名公钥概念

    youdao

  • Appendix 4: Public-key cryptography terminology.

    附录4公钥加密术语

    youdao

  • A few changes are needed to support using WS-Security public-key cryptography features, though, so a separate code package accompanies this article (see Download).

    但是需要作出一些修改支持使用WS - Security公开密加密特性因此本文附带了一个单独代码(下载)。

    youdao

  • But first, I'll give you a quick rundown of the principles of public-key cryptography - the basis for most of WS-Security's encrypting and signing features.

    但是我们首先扼要概述一下公开密加密原理WS - Security加密签名特性主要基础

    youdao

  • Elliptic Curve Cryptography (ECC) has the highest safety strength of private key per bit in the Public-Key Cryptography recently.

    椭圆曲线密码体制是目前公钥体制比特密钥安全强度最高的一种密码体制。

    youdao

  • The scheme perfectly integrates digital signature scheme with public key cryptography system.

    方案数字签名公钥密码体制的有机集成。

    youdao

  • In the following example involving Alice and Bob, public key cryptography is easily used to verify identity.

    下列例子包括公钥加密轻松地校验身份。

    youdao

  • A new invisible watermarking technique which could localize tampered areas for image authentication was proposed, based on image feature and public key cryptography.

    提出基于图像特征公钥密码系统的易损水印算法,图像认证能够定位图像被篡改的位置。

    youdao

  • The area and speed of cryptography coprocessor impede the application of public-key cryptography RSA for smart card.

    密码处理器的面积过大速度较慢制约公钥密码体制RSA智能卡中的应用

    youdao

  • In this paper, the principles of digital signature is given, Meanwhile the key technology of digital signature: public key cryptography and Hash algorithms is introduced.

    文章阐述数字签名技术原理并介绍了数字签名中的关键技术:公钥加密体制哈希算法

    youdao

  • It seems that braid group is a kind of considerable public key cryptography platform, but current key agreement protocols, such as AAG, AAFG and BDH, all have different degrees of security weaknesses.

    辫子种新兴适用于量子计算机时代的公钥密码平台但是目前基于辫子群的密钥协商协议AAGAAFGBDH不同程度的安全弱点。

    youdao

  • The wide use of public key cryptography requires the ability to verify the authenticity of public keys.

    公钥密码学广泛应用使得公钥真实性验证性成为必要条件。

    youdao

  • This asymmetry is the property that makes public key cryptography so useful.

    这个非对称特性使得公钥加密有用。 。

    youdao

  • Based on the public key cryptography, a mobile communication protocol providing end - to - end security is provided.

    基于公钥加密体制,本文提出了一种具有移动终端安全性的无线通讯协议

    youdao

  • Based on the ideas of public key cryptography, a new scrambling technology of digital image based on primitive roots is given.

    密码学中的公钥思想为基础,提出了一种基于数字图像置乱技术

    youdao

  • Based on the ideas of public key cryptography, a new scrambling technology of digital image based on primitive roots is given.

    密码学中的公钥思想为基础,提出了一种基于数字图像置乱技术

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定