• 旁路攻击一种新的密码分析方法利用了密码设备在运算时泄漏的信息破解密码系统。

    Side-channel attack is a new cryptanalysis, and it utilizes the run-time leakages to extract the secret.

    youdao

  • 多重线性密码分析线性密码分析方法一种推广如何利用多重线性密码分析方法攻击DES一直是人们关注的焦点。

    Linear cryptanalysis with multiple approximations is a generalization of linear cryptanalysis, and how to attack DES efficiently by multiple linear cryptanalysis method is still a problem.

    youdao

  • 简单最基本方法使用统计分析技术执行隐写式密码解密

    In its simplest and most basic form, steganalysis is performed through the use of statistical analysis techniques.

    youdao

  • 最后密码分析进步可以使任何加密机制算法变得不再安全因为总是有新奇的破解方法找出来。

    Finally, cryptanalysis advances can render any cryptographic mechanism or algorithm insecure as novel methods of breaking them are discovered.

    youdao

  • RUC模型RCA模型可重构密码处理结构研究提供了基本的参考结构分析方法设计准则

    RCA and RUC provide a structural sketch, analysis methods and design rules for the research of reconfigurable cipher processing architecture.

    youdao

  • 人们提出多种密码协议分析方法BAN逻辑其中重要的一种。

    There are many ways proposed to analyze the security protocol, the BAN-like logic is one of the important ways.

    youdao

  • 论文第四章重点介绍非线性映射方法分析生物基因密码使用情况并得到的相关结论。

    In chapter IV, the codon usage preferences in prokaryotic organism are analyzed by nonlinear mapping method.

    youdao

  • 通过黑客软件获取密码原理及一般工作方法分析,提出一种保护密码方法对于加强网络安全具有一定借鉴意义。

    Password protection method was presented to strengthen the network security by analyzing the principle on hacker's detecting password and its common working methods.

    youdao

  • 差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法目前的信息安全系统构成严峻挑战。

    Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system.

    youdao

  • 结果表明利用符号模型检测方法分析发现密码协议重放攻击的漏洞种行之有效的方法

    Results show that the method using symbol model checker can discover replay attacks upon some cryptographic protocols and is effective.

    youdao

  • 执行密码芯片设计中一余、低功耗抵抗功耗分析攻击方法

    The random order execution which used in cryptographic ICs is a kind of few redundancy and low power countermeasures against power analysis attacks.

    youdao

  • SPN结构一种流行分组密码总体结构差分线性分析攻击分组密码强有力的方法

    SPN is a popular overall structure of block cipher, and the differential cryptanalysis and linear cryptanalysis are the most powerful approaches to attack most symmetric block ciphers.

    youdao

  • 差分功率分析DPA方法有效地加密集成电路芯片进行攻击解密绕过了加解密算法繁琐的数学分析从而获取密码信息

    The method of DPA may attack on encrypted FPGA effectively, which does not need complex analysis to encryption arithmetic and obtains ciphertext and information.

    youdao

  • 利用形式化分析密码协议方法检测密码协议潜在的安全漏洞,已成为密码一个新的研究方向

    It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol.

    youdao

  • 基于网络数据传输安全问题信息安全领域的重要课题之一,本文分析现有数据加密方法的基础上,数据传输系统应用一种基于分组密码新概念的新算法排列加密算法。

    In this paper, a permutation code security algorithm based on the block cipher that is widely used in the data transmission system is put up after carefully studied the current encryption methods.

    youdao

  • 开放性互联网络网络安全进行了介绍公钥密码体制OSI的网络安全体系结构进行了详细分析,并找出存在问题解决方法

    This paper introduces the security of interconnection network. The open cipher and OSI network security structure are analysed. The existing problems are discussed and solved.

    youdao

  • 给出差分序列若干性质,对差分分析方法序列密码中的应用一些探讨给出了攻击实例

    In this paper, we point out some properties of the differential sequence, discuss the applications of differential cryptanalysis in sequence cipher attack and provide an attack sample.

    youdao

  • 空间理论一种新兴的用于密码协议形式化分析方法

    Strand space theory is a method for stating and proving correctness properties for cryptographic protocols.

    youdao

  • 方法基于公钥密码体制分析研究RSA密码体制的实现算法设计系统程序模块

    Methods Based on the Analyzing of public key cryptosystem, a practical algorithm of RSA is studied, and programmer model is designed.

    youdao

  • 分析病毒文件完整性破坏,对此提出了使用公钥密码体制进行数字签名来保护文件完整性的方法

    The destruction of the integrity of executable files by virus is discussed and the conceptof integrity information of executable files is proposed.

    youdao

  • 计算基于氨基酸编码方法同义密码相对使用分析78个人类基因(19967个密码子)中基于拟氨基酸编码方法下的同义密码子的偏好使用情况。

    The relative usage degree of the synonymous codon is computed and the use of preferences of the synonymous codon in 78 human genes (19967 codons) is analysed based on the quasi-amino acids coding.

    youdao

  • 提出根据莫尔理论制作型全息密码方法,对此方法作了理论分析给出实验结果

    A study on concealed codes using moire method is presented. The theoretical analysis and experimental results are given.

    youdao

  • 一些研究人员密码协议分析引入形式化方法通过建立形式模型自动检测工具分析密码协议的安全性,取得较大的成功。

    Some researchers introduced formal methods for analyzing cryptographic protocols, and achieved many significant results by building formal models and automatic verifying tools.

    youdao

  • 本文扩展空间模型及其认证测试方法增强丰富密码一些复杂操作分析描述能力。

    This dissertation extends the strand space model and its authentication test, which can enhance the analyses and description of some cryptographic primitives rich in cryptographic primitives.

    youdao

  • 其次分析方法密码协议攻击者能力具体形式化描述无关

    The formalism is independent of the concrete formalization of a protocol or attackers' possible behaviors.

    youdao

  • 其次分析方法密码协议攻击者能力具体形式化描述无关

    The formalism is independent of the concrete formalization of a protocol or attackers' possible behaviors.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定