PPT from the linguistic point of view that this is meme and gene analysis of language differences, by reading this article can help readers master secret algorithm has a deeper understanding.
本篇ppt从语言学角度分析了密母和基因语言的区别,通过阅读本篇文章,可以帮助读者对密母算法有一个更深的理解。
An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.
对称密钥(公钥)算法用于交换在对称算法中使用的加密密钥,以及用于数字签名。
Another popular secret-key cryptosystem is the International Data Encryption Algorithm (IDEA).
另一个流行的秘密密钥加密系统是国际数据加密算法(IDEA)。
A symmetric algorithm requires that both the sender and receiver of the message use the same secret key; this is often referred to as secret key cryptography.
对称算法要求消息的发送方和接收方使用同一个秘钥;这通常被称作秘钥密码术。
Many experts know the basic "PageRank" algorithm, but no one know its detail, which is top commercial secret.
许多专家都认识“PageRank”算法,但是没有人知道的更多,因为这是最高的商业机密。
Kerberos defines an algorithm for processing a user's password to produce a secret key. The Kerberos client will use this key for decryption during the process of getting the TGT.
Kerberos定义了一种对用户密码进行处理以生成一个密钥的算法。
An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.
非对称算法使用不同的密钥对消息进行加密或解密;其中一个秘钥必须是秘密的,而另一个密钥通常是公开的。
I will now use the temporary secret key to encrypt the original padded byte array from Step 3 using the DES-CBC algorithm.
现在我要使用这个临时密钥以des -cbc算法加密第3步中得到的附加后的字节数组。
Kerberos defines an algorithm to generate a secret key from the user's password.
Kerberos定义了一种利用用户的密码生成密钥的算法。
So far, I have discussed the low-level methods of the ASN1DataTypes class and implemented the algorithm for generating a secret key from the user's password.
到目前为止,我讨论了ASN1DataTypes类的底层方法并实现了利用用户的密码生成密钥的算法。
SECRET is a new algorithm for scalable linear regression trees.
SECRET是一个关于可伸缩线形回归树的算法。
By using SP algorithm and error correction code technology, a combating burst error and large capacity data hiding method for secret transmission was proposed based on images.
采用SP交织算法、纠错编码,给出了一种基于图像的抗突发误码的大容量数据嵌入隐秘传输方法。
This is one of the secrets of meteorites algorithm, named for the meteorite secret.
这是一个关于陨石的秘密的算法,名字为陨石的秘密。
An ideal threshold scheme is constructed from Maximum Distance Separable (MDS) codes, the recovery algorithm in this scheme can detect cheating, recover the correct secret and identify cheaters.
用最大距离可分码构造了一个理想门限体制,该体制中的秘密恢复算法可以正确地恢复秘密,并可检测出伪造的秘密份额,确定伪造者的身份。
The multiple iterative digital image hiding algorithm based on chaos sequences is introduced, with which a secret image can be hidden in one carrier image through many images.
提出了基于混沌序列的数字图像多幅迭代混合算法,利用图像的迭代混合可以将一幅图像通过一组图像隐藏起来。
Steganalysis is a kind of attacking behavior against steganography algorithm, with the purpose to reveal the existence of secret message in the digital media.
隐写分析是一种针对隐写算法的、以揭示数字媒体中秘密信息存在性为目的的攻击行为。
An algorithm based on singular value decomposition (SVD) is proposed, which hides secret information in singular value vector.
给出了一种基于矩阵奇异值分解(SVD)和奇异值量化的信息隐藏算法。
To make hiding information have better sheltered performance, research has been done in embedded algorithm and treat secret information.
为了使隐藏信息具有良好的隐蔽性能,通常在嵌入算法和秘密信息的处理两个方面展开研究。
The experimental results show that the index partition algorithm improved the robustness of the secret information during the transmission.
实验表明索引划分算法提高了秘密信息在传输过程中的鲁棒性。
To improve the encoding efficiency of the current visual secret sharing schemes, a novel encoding algorithm, self-adaptive multi-pixel encoding (SME), was proposed.
为提高可视密图分存方案的编码效率,提出了基于自适应多像素编码的可视密图分存算法。
In our paper, we propose a novel frequency domain embedding algorithm based on the correlation analysis, which can solve effectively to hide the secret information of large capacity.
本文以内容相关性为基础,提出一种新的基于相关性分析的频率域嵌入算法,以解决信息隐藏中由于秘密信息容量大而无法有效操作的问题。
Time-based cache attacks analyzes the time difference in the execution of algorithm over a processor, and recovers the secret key.
基于时间的缓存攻击是指通过分析处理器中算法的不同执行时间来恢复密钥的攻击。
On the basis of study of secret key algorithm RSA based smart card identity identification technology then puts forward HASH function based smart card identity identification method.
在研究基于RS A密钥算法智能卡认证技术的基础上,提出了基于散列函数的智能卡访问认证方法。
By using this algorithm, a secret text can be replaced by a pubilic text. The algorithm can survive from communication noise.
其效果是,该算法可以实现用一段普通文本来掩饰机密文本的传输,并且该算法具有一定的抵抗干扰的能力。
Large scale integrated circuit ASIC and processors can realize the implementation of customized user algorithm, pretreatment and function of secret protection.
大规模集成电路asic和处理器可实现用户算法定制、预处理以及保密功能。
The authors designed the communication system of the teaching platform and the pseudo random number generator to generate secret keys of the algorithm.
设计了实验平台的通信系统及算法过程中产生密钥的伪随机序列发生器。
The secret key of next period is derived from the current secret key via key-update algorithm which is arranged in system after a period end.
每个周期结束时,利用该周期的私钥,由系统内设置好的更新算法产生下一个周期的私钥。
The proposed method made use of the LSB matching method based on particle swarm optimization algorithm to embed the secret data and maintain image quality.
同时采用基于粒子群优化的LSB替换算法来嵌入隐秘信息,取得了很好的图像质量和嵌入效果。
The advantages of this algorithm were, rapidity of encryption, carried out easily by computer, ampliative secret key space and so on.
该算法有加密速度快、易于计算机实现、密钥空间大等优点。
In chapter 7, it produces researches of encryption algorithm, secret-key's produce, and its use, management security.
第七章对加密算法和密钥,以及在一卡通系统的产生、使用与管理提出了安全性的研究。
应用推荐