提出了一个完全式公钥广播加密方案。
This paper proposes a fully public key tracing and revocation scheme.
描述如何从各种加密基元创建加密方案。
Describes how to help create a cryptographic scheme from the various cryptographic primitives.
协议的安全性基于其使用的公钥加密方案。
Accordingly, the protocol security is rested on the used underlying public cryptosystems.
本文提出了两种基于时空混沌的信息加密方案。
Two encryption schemes based on spatiotemporal chaotic system are proposed in this paper.
如果数据库暴露了,那么使用加密方案将防止暴露用户的密码。
Using an encryption scheme will prevent exposing a user's password if the database ever becomes compromised.
基于分段非线性混沌映射设计了一种流密码加密方案。
A stream cipher encryption scheme was designed based on piecewise nonlinear chaotic map.
单向加密方案和crypt特别受欢迎。可以使保护信息的方法更安全。
One-way encryption schemes, and crypt in particular, are extremely popular, secure ways of protecting information.
克服,你需要使用对称加密方案和需要的关键每一次你读/写文件。
To overcome that, you'd need to use a symmetric encryption scheme and require the key each times you read/write the file.
根据ASP平台的安全需求,分析了分布式系统用户密码加密方案。
According to the security requirements of ASP platform, the user password encrypting scheme of distributed system is analyzed.
最后,本文给出了一个基于此混合加密方案的多媒体会议系统的实现。
Lastly, this paper give a realization of distributed multipoint multimedia conferences using this encryption scheme.
公钥加密算法和追踪算法结合在一起,可构成一个公钥广播加密方案。
A public key tracing and revocation scheme can combine the public key encryption with the traitor tracing algorithm.
有关加密和传输密钥与IV的过程的更多信息,请参见创建加密方案。
For more information on this process of encrypting and transferring the key and IV, see Creating a Cryptographic Scheme.
证明了给出的协议既是一个安全的加密方案,也是一个安全的认证方案。
It was demonstrated that the proposed protocol was not only a secure encryption scheme, but also a secure authentication scheme.
他称这种自我更新的属性为“自展的”,该属性保证他的同态加密方案是完全同态的。
He calls this self-refreshing property "bootstrapping," and it was enough to make his homomorphic encryption scheme fully homomorphic.
引入流概念来结构化数据报通信单元,介绍了基于流的数据报加密方案。
In this paper, we advocate the use of flows as a basis for structuring secure datagram communications.
环认证加密方案是加密方案与环签名方案的融合,具有这两种方案的优点。
Ring authenticated encryption scheme can be regarded as the combination of message encryption scheme and ring signature scheme, which has both encryption and ring signatures priority.
但通过研究发现,有的环认证加密方案不具有环签名的无条件匿名性的性质。
This paper found that the scheme didn t have the unconditional anonymity characteristic being including in a ring signature, so improved it.
本文结合PGP加密标准的特点,设计了移动警务通系统数据传输加密方案。
This thesis coalesces the characteristic of PGP encryption standard, and design a data transfer encryption Solution in the police mobile wireless system.
本文在分析H.323标准模型及编解码算法后,提出了视频会议的加密方案。
The system model and algorithms of coding and decoding of H. 323 are analyzed in this paper.
在对换位加密技术研究的基础上,提出了一个基于混沌系统的动态换位加密方案。
The technology of transposition cipher is discussed firstly and a novel dynamic transposition cipher based on chaotic systems is presented.
将智能卡技术引入认证加密体制中,提出了一种基于离散对数问题的认证加密方案。
Smart card is integrated into authenticated encryption scheme, a new cryptographic scheme based on the discrete logarithm problem is presented.
为了解决这些问题,我们需要一种具有灵活加密方案的端对端安全性模型以满足一系列不同的需求。
To resolve these issues, we need an end-to-end security model with flexible encryption schemes to meet a range of different requirements.
图像部分加密方法只加密图像压缩编码的部分重要数据,是一种可行的实时加密方案。
This paper presents a partial encryption of gray images compressed by Set Partitioning in Hierarchical Trees (SPIHT).
本文提出了一类新的认证加密方案,这类方案首次将消息可恢复签名和对称加密有机结合。
A new type of authenticated encryption schemes is proposed. It first combines signature with message recovery schemes and symmetric encryption schemes together.
随着引入新型数字视频技术(如加密方案、高清视频、深色浓度),视频测试应用日趋复杂。
Video test applications are increasingly more complex with the introduction of new digital video technologies such as encryption schemes, Full HD video and deep color content.
同时将该方案推广到了多个接受者的情形,最后给出了高效的可公开验证rsa加密方案。
Also, the scheme is extended to the context of multi-recipient ElGamal encryption and an efficient publicly verifiable RSA scheme is proposed.
在研究现有的安全方案的基础上,提出了一种支持安全网内处理的无线传感器网络加密方案。
Based on learning the existing security schemes, an encryption scheme supporting secure in-network processing for wireless sensor networks was introduced.
在实际中通常是把叛逆者追踪方案和广播加密方案有效地结合起来使盗版造成的损失最小化。
In practice, traitor tracing schemes and broadcast encryption schemes can be effectively combined in order to minimize the damage as the result of piracy.
为了提供保密性和认证功能,签字和加密方案是基本的密码学工具,特别是在公钥密码体制中。
Encryption and signature schemes are fundamental cryptographic tools for providing privacy and authenticity respectively, respectively, in the public-key setting.
为了提供保密性和认证功能,签字和加密方案是基本的密码学工具,特别是在公钥密码体制中。
Encryption and signature schemes are fundamental cryptographic tools for providing privacy and authenticity respectively, respectively, in the public-key setting.
应用推荐